121
BILL START RECORDING LECTURE

BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

BILL STARTRECORDING LECTURE

Page 2: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold SecretSharing:

Information-Theoretic

Page 3: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing

Zelda has a secret s ∈ {0, 1}n.

Def Let 1 ≤ t ≤ m. (t,m)-secret sharing is a way for Zelda togive strings to A1, . . . ,Am such that:

1. If any t get together then they can learn s.

2. If any t − 1 get together they cannot learn s.

What do we mean by Cannot learn the secret?

Info-theory-security. If t − 1 people have big fancy supercomputersthey cannot learn ANYTHING about s.

Time permitting We we look at comp-security.

Page 4: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing

Zelda has a secret s ∈ {0, 1}n.

Def Let 1 ≤ t ≤ m. (t,m)-secret sharing is a way for Zelda togive strings to A1, . . . ,Am such that:

1. If any t get together then they can learn s.

2. If any t − 1 get together they cannot learn s.

What do we mean by Cannot learn the secret?

Info-theory-security. If t − 1 people have big fancy supercomputersthey cannot learn ANYTHING about s.

Time permitting We we look at comp-security.

Page 5: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing

Zelda has a secret s ∈ {0, 1}n.

Def Let 1 ≤ t ≤ m. (t,m)-secret sharing is a way for Zelda togive strings to A1, . . . ,Am such that:

1. If any t get together then they can learn s.

2. If any t − 1 get together they cannot learn s.

What do we mean by Cannot learn the secret?

Info-theory-security. If t − 1 people have big fancy supercomputersthey cannot learn ANYTHING about s.

Time permitting We we look at comp-security.

Page 6: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing

Zelda has a secret s ∈ {0, 1}n.

Def Let 1 ≤ t ≤ m. (t,m)-secret sharing is a way for Zelda togive strings to A1, . . . ,Am such that:

1. If any t get together then they can learn s.

2. If any t − 1 get together they cannot learn s.

What do we mean by Cannot learn the secret?

Info-theory-security. If t − 1 people have big fancy supercomputersthey cannot learn ANYTHING about s.

Time permitting We we look at comp-security.

Page 7: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing

Zelda has a secret s ∈ {0, 1}n.

Def Let 1 ≤ t ≤ m. (t,m)-secret sharing is a way for Zelda togive strings to A1, . . . ,Am such that:

1. If any t get together then they can learn s.

2. If any t − 1 get together they cannot learn s.

What do we mean by Cannot learn the secret?

Info-theory-security. If t − 1 people have big fancy supercomputersthey cannot learn ANYTHING about s.

Time permitting We we look at comp-security.

Page 8: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing

Zelda has a secret s ∈ {0, 1}n.

Def Let 1 ≤ t ≤ m. (t,m)-secret sharing is a way for Zelda togive strings to A1, . . . ,Am such that:

1. If any t get together then they can learn s.

2. If any t − 1 get together they cannot learn s.

What do we mean by Cannot learn the secret?

Info-theory-security. If t − 1 people have big fancy supercomputersthey cannot learn ANYTHING about s.

Time permitting We we look at comp-security.

Page 9: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing

Zelda has a secret s ∈ {0, 1}n.

Def Let 1 ≤ t ≤ m. (t,m)-secret sharing is a way for Zelda togive strings to A1, . . . ,Am such that:

1. If any t get together then they can learn s.

2. If any t − 1 get together they cannot learn s.

What do we mean by Cannot learn the secret?

Info-theory-security. If t − 1 people have big fancy supercomputersthey cannot learn ANYTHING about s.

Time permitting We we look at comp-security.

Page 10: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Applications

Rumor Secret Sharing is used for the Russian Nuclear Codes.There are three people (one is Putin) and if two of them agree tolaunch, they can launch.

Fact For people signing a contract long distance, secret sharing isused as a building block in the protocol.

Page 11: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Applications

Rumor Secret Sharing is used for the Russian Nuclear Codes.There are three people (one is Putin) and if two of them agree tolaunch, they can launch.

Fact For people signing a contract long distance, secret sharing isused as a building block in the protocol.

Page 12: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(4, 4)-Secret Sharing

Zelda has a secret s. A1, A2, A3, A4 are people. We want:

1. If all four of A1,A2,A3,A4 get together, they can find s.

2. If any three of them get together, then they learn NOTHING.

Page 13: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(4, 4)-Secret Sharing

Zelda has a secret s. A1, A2, A3, A4 are people. We want:

1. If all four of A1,A2,A3,A4 get together, they can find s.

2. If any three of them get together, then they learn NOTHING.

Page 14: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(4, 4)-Secret Sharing

Zelda has a secret s. A1, A2, A3, A4 are people. We want:

1. If all four of A1,A2,A3,A4 get together, they can find s.

2. If any three of them get together, then they learn NOTHING.

Page 15: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 16: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 17: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 18: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 19: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s.

YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 20: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 21: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING.

NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 22: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 23: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 24: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 25: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

An Attempt at (4, 4)-Secret Sharing

1. Zelda breaks s up into s = s1s2s3s4 where

|s1| = |s2| = |s3| = |s4| =n

4

2. Zelda gives Ai the string si .

Does this work?

1. If A1,A2,A3,A4 get together they can find s. YES!!

2. If any three of them get together they learn NOTHING. NO.

2.1 A1 learns s1 which is 14 of the secret!

2.2 A1, A2 learn s1s2 which is 12 of the secret!

2.3 A1, A2, A3 learn s1s2s3 which is 34 of the secret!

Page 26: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Is (4, 4)-Secret Sharing Possible?

VOTE Is (4, 4)-Secret sharing possible?

1. YES and this is known.

2. NO and this is known.

3. YES given some hardness assumption, and this is known.

4. UNKNOWN TO SCIENCE!

YES

Page 27: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Is (4, 4)-Secret Sharing Possible?

VOTE Is (4, 4)-Secret sharing possible?

1. YES and this is known.

2. NO and this is known.

3. YES given some hardness assumption, and this is known.

4. UNKNOWN TO SCIENCE!

YES

Page 28: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Is (4, 4)-Secret Sharing Possible?

VOTE Is (4, 4)-Secret sharing possible?

1. YES and this is known.

2. NO and this is known.

3. YES given some hardness assumption, and this is known.

4. UNKNOWN TO SCIENCE!

YES

Page 29: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Is (4, 4)-Secret Sharing Possible?

VOTE Is (4, 4)-Secret sharing possible?

1. YES and this is known.

2. NO and this is known.

3. YES given some hardness assumption, and this is known.

4. UNKNOWN TO SCIENCE!

YES

Page 30: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Is (4, 4)-Secret Sharing Possible?

VOTE Is (4, 4)-Secret sharing possible?

1. YES and this is known.

2. NO and this is known.

3. YES given some hardness assumption, and this is known.

4. UNKNOWN TO SCIENCE!

YES

Page 31: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Is (4, 4)-Secret Sharing Possible?

VOTE Is (4, 4)-Secret sharing possible?

1. YES and this is known.

2. NO and this is known.

3. YES given some hardness assumption, and this is known.

4. UNKNOWN TO SCIENCE!

YES

Page 32: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Random String Approach

Zelda gives out shares of the secret

1. Secret s ∈ {0, 1}n. Zelda gen random r1, r2, r3 ∈ {0, 1}n.

2. Zelda gives A1 s1 = r1.Zelda gives A2 s2 = r2.Zelda gives A3 s3 = r3.Zelda gives A4 s4 = s ⊕ r1 ⊕ r2 ⊕ r3.

A1,A2,A3,A4 Can Recover the Secret

s1 ⊕ s2 ⊕ s3 ⊕ s4 = r1 ⊕ r2 ⊕ r3 ⊕ r1 ⊕ r2 ⊕ r3 ⊕ s = s

Easy to see that if ≤ 3 get together they learn NOTHING

Page 33: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Random String Approach

Zelda gives out shares of the secret

1. Secret s ∈ {0, 1}n. Zelda gen random r1, r2, r3 ∈ {0, 1}n.

2. Zelda gives A1 s1 = r1.Zelda gives A2 s2 = r2.Zelda gives A3 s3 = r3.Zelda gives A4 s4 = s ⊕ r1 ⊕ r2 ⊕ r3.

A1,A2,A3,A4 Can Recover the Secret

s1 ⊕ s2 ⊕ s3 ⊕ s4 = r1 ⊕ r2 ⊕ r3 ⊕ r1 ⊕ r2 ⊕ r3 ⊕ s = s

Easy to see that if ≤ 3 get together they learn NOTHING

Page 34: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Random String Approach

Zelda gives out shares of the secret

1. Secret s ∈ {0, 1}n. Zelda gen random r1, r2, r3 ∈ {0, 1}n.

2. Zelda gives A1 s1 = r1.

Zelda gives A2 s2 = r2.Zelda gives A3 s3 = r3.Zelda gives A4 s4 = s ⊕ r1 ⊕ r2 ⊕ r3.

A1,A2,A3,A4 Can Recover the Secret

s1 ⊕ s2 ⊕ s3 ⊕ s4 = r1 ⊕ r2 ⊕ r3 ⊕ r1 ⊕ r2 ⊕ r3 ⊕ s = s

Easy to see that if ≤ 3 get together they learn NOTHING

Page 35: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Random String Approach

Zelda gives out shares of the secret

1. Secret s ∈ {0, 1}n. Zelda gen random r1, r2, r3 ∈ {0, 1}n.

2. Zelda gives A1 s1 = r1.Zelda gives A2 s2 = r2.

Zelda gives A3 s3 = r3.Zelda gives A4 s4 = s ⊕ r1 ⊕ r2 ⊕ r3.

A1,A2,A3,A4 Can Recover the Secret

s1 ⊕ s2 ⊕ s3 ⊕ s4 = r1 ⊕ r2 ⊕ r3 ⊕ r1 ⊕ r2 ⊕ r3 ⊕ s = s

Easy to see that if ≤ 3 get together they learn NOTHING

Page 36: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Random String Approach

Zelda gives out shares of the secret

1. Secret s ∈ {0, 1}n. Zelda gen random r1, r2, r3 ∈ {0, 1}n.

2. Zelda gives A1 s1 = r1.Zelda gives A2 s2 = r2.Zelda gives A3 s3 = r3.

Zelda gives A4 s4 = s ⊕ r1 ⊕ r2 ⊕ r3.

A1,A2,A3,A4 Can Recover the Secret

s1 ⊕ s2 ⊕ s3 ⊕ s4 = r1 ⊕ r2 ⊕ r3 ⊕ r1 ⊕ r2 ⊕ r3 ⊕ s = s

Easy to see that if ≤ 3 get together they learn NOTHING

Page 37: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Random String Approach

Zelda gives out shares of the secret

1. Secret s ∈ {0, 1}n. Zelda gen random r1, r2, r3 ∈ {0, 1}n.

2. Zelda gives A1 s1 = r1.Zelda gives A2 s2 = r2.Zelda gives A3 s3 = r3.Zelda gives A4 s4 = s ⊕ r1 ⊕ r2 ⊕ r3.

A1,A2,A3,A4 Can Recover the Secret

s1 ⊕ s2 ⊕ s3 ⊕ s4 = r1 ⊕ r2 ⊕ r3 ⊕ r1 ⊕ r2 ⊕ r3 ⊕ s = s

Easy to see that if ≤ 3 get together they learn NOTHING

Page 38: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Random String Approach

Zelda gives out shares of the secret

1. Secret s ∈ {0, 1}n. Zelda gen random r1, r2, r3 ∈ {0, 1}n.

2. Zelda gives A1 s1 = r1.Zelda gives A2 s2 = r2.Zelda gives A3 s3 = r3.Zelda gives A4 s4 = s ⊕ r1 ⊕ r2 ⊕ r3.

A1,A2,A3,A4 Can Recover the Secret

s1 ⊕ s2 ⊕ s3 ⊕ s4 = r1 ⊕ r2 ⊕ r3 ⊕ r1 ⊕ r2 ⊕ r3 ⊕ s = s

Easy to see that if ≤ 3 get together they learn NOTHING

Page 39: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Random String Approach

Zelda gives out shares of the secret

1. Secret s ∈ {0, 1}n. Zelda gen random r1, r2, r3 ∈ {0, 1}n.

2. Zelda gives A1 s1 = r1.Zelda gives A2 s2 = r2.Zelda gives A3 s3 = r3.Zelda gives A4 s4 = s ⊕ r1 ⊕ r2 ⊕ r3.

A1,A2,A3,A4 Can Recover the Secret

s1 ⊕ s2 ⊕ s3 ⊕ s4 = r1 ⊕ r2 ⊕ r3 ⊕ r1 ⊕ r2 ⊕ r3 ⊕ s = s

Easy to see that if ≤ 3 get together they learn NOTHING

Page 40: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(2, 4)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}n

Want A1,A2 to determine s, but neither A1 nor A2 alone can.Idea Zelda will secret share with every pair separately.Z Gen random r12. Give A1 (1, 2, r12) and A2 (1, 2, s ⊕ r12).Z Gen random r13. Give A1 (1, 3, r13) and A3 (1, 3, s ⊕ r13).Z Gen random r14. Give A1 (1, 4, r14) and A4 (1, 4, s ⊕ r14).Z Gen random r23. Give A2 (2, 3, r23) and A3 (2, 3, s ⊕ r23).Z Gen random r24. Give A2 (2, 4, r24) and A4 (2, 4, s ⊕ r24).Z Gen random r34. Give A3 (3, 4, r34) and A4 (3, 4, s ⊕ r34).If any two get together they can find secret. No one person canfind the secret.

Page 41: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(2, 4)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}nWant A1,A2 to determine s, but neither A1 nor A2 alone can.Idea Zelda will secret share with every pair separately.

Z Gen random r12. Give A1 (1, 2, r12) and A2 (1, 2, s ⊕ r12).Z Gen random r13. Give A1 (1, 3, r13) and A3 (1, 3, s ⊕ r13).Z Gen random r14. Give A1 (1, 4, r14) and A4 (1, 4, s ⊕ r14).Z Gen random r23. Give A2 (2, 3, r23) and A3 (2, 3, s ⊕ r23).Z Gen random r24. Give A2 (2, 4, r24) and A4 (2, 4, s ⊕ r24).Z Gen random r34. Give A3 (3, 4, r34) and A4 (3, 4, s ⊕ r34).If any two get together they can find secret. No one person canfind the secret.

Page 42: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(2, 4)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}nWant A1,A2 to determine s, but neither A1 nor A2 alone can.Idea Zelda will secret share with every pair separately.Z Gen random r12. Give A1 (1, 2, r12) and A2 (1, 2, s ⊕ r12).

Z Gen random r13. Give A1 (1, 3, r13) and A3 (1, 3, s ⊕ r13).Z Gen random r14. Give A1 (1, 4, r14) and A4 (1, 4, s ⊕ r14).Z Gen random r23. Give A2 (2, 3, r23) and A3 (2, 3, s ⊕ r23).Z Gen random r24. Give A2 (2, 4, r24) and A4 (2, 4, s ⊕ r24).Z Gen random r34. Give A3 (3, 4, r34) and A4 (3, 4, s ⊕ r34).If any two get together they can find secret. No one person canfind the secret.

Page 43: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(2, 4)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}nWant A1,A2 to determine s, but neither A1 nor A2 alone can.Idea Zelda will secret share with every pair separately.Z Gen random r12. Give A1 (1, 2, r12) and A2 (1, 2, s ⊕ r12).Z Gen random r13. Give A1 (1, 3, r13) and A3 (1, 3, s ⊕ r13).

Z Gen random r14. Give A1 (1, 4, r14) and A4 (1, 4, s ⊕ r14).Z Gen random r23. Give A2 (2, 3, r23) and A3 (2, 3, s ⊕ r23).Z Gen random r24. Give A2 (2, 4, r24) and A4 (2, 4, s ⊕ r24).Z Gen random r34. Give A3 (3, 4, r34) and A4 (3, 4, s ⊕ r34).If any two get together they can find secret. No one person canfind the secret.

Page 44: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(2, 4)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}nWant A1,A2 to determine s, but neither A1 nor A2 alone can.Idea Zelda will secret share with every pair separately.Z Gen random r12. Give A1 (1, 2, r12) and A2 (1, 2, s ⊕ r12).Z Gen random r13. Give A1 (1, 3, r13) and A3 (1, 3, s ⊕ r13).Z Gen random r14. Give A1 (1, 4, r14) and A4 (1, 4, s ⊕ r14).

Z Gen random r23. Give A2 (2, 3, r23) and A3 (2, 3, s ⊕ r23).Z Gen random r24. Give A2 (2, 4, r24) and A4 (2, 4, s ⊕ r24).Z Gen random r34. Give A3 (3, 4, r34) and A4 (3, 4, s ⊕ r34).If any two get together they can find secret. No one person canfind the secret.

Page 45: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(2, 4)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}nWant A1,A2 to determine s, but neither A1 nor A2 alone can.Idea Zelda will secret share with every pair separately.Z Gen random r12. Give A1 (1, 2, r12) and A2 (1, 2, s ⊕ r12).Z Gen random r13. Give A1 (1, 3, r13) and A3 (1, 3, s ⊕ r13).Z Gen random r14. Give A1 (1, 4, r14) and A4 (1, 4, s ⊕ r14).Z Gen random r23. Give A2 (2, 3, r23) and A3 (2, 3, s ⊕ r23).

Z Gen random r24. Give A2 (2, 4, r24) and A4 (2, 4, s ⊕ r24).Z Gen random r34. Give A3 (3, 4, r34) and A4 (3, 4, s ⊕ r34).If any two get together they can find secret. No one person canfind the secret.

Page 46: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(2, 4)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}nWant A1,A2 to determine s, but neither A1 nor A2 alone can.Idea Zelda will secret share with every pair separately.Z Gen random r12. Give A1 (1, 2, r12) and A2 (1, 2, s ⊕ r12).Z Gen random r13. Give A1 (1, 3, r13) and A3 (1, 3, s ⊕ r13).Z Gen random r14. Give A1 (1, 4, r14) and A4 (1, 4, s ⊕ r14).Z Gen random r23. Give A2 (2, 3, r23) and A3 (2, 3, s ⊕ r23).Z Gen random r24. Give A2 (2, 4, r24) and A4 (2, 4, s ⊕ r24).

Z Gen random r34. Give A3 (3, 4, r34) and A4 (3, 4, s ⊕ r34).If any two get together they can find secret. No one person canfind the secret.

Page 47: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(2, 4)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}nWant A1,A2 to determine s, but neither A1 nor A2 alone can.Idea Zelda will secret share with every pair separately.Z Gen random r12. Give A1 (1, 2, r12) and A2 (1, 2, s ⊕ r12).Z Gen random r13. Give A1 (1, 3, r13) and A3 (1, 3, s ⊕ r13).Z Gen random r14. Give A1 (1, 4, r14) and A4 (1, 4, s ⊕ r14).Z Gen random r23. Give A2 (2, 3, r23) and A3 (2, 3, s ⊕ r23).Z Gen random r24. Give A2 (2, 4, r24) and A4 (2, 4, s ⊕ r24).Z Gen random r34. Give A3 (3, 4, r34) and A4 (3, 4, s ⊕ r34).

If any two get together they can find secret. No one person canfind the secret.

Page 48: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(2, 4)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}nWant A1,A2 to determine s, but neither A1 nor A2 alone can.Idea Zelda will secret share with every pair separately.Z Gen random r12. Give A1 (1, 2, r12) and A2 (1, 2, s ⊕ r12).Z Gen random r13. Give A1 (1, 3, r13) and A3 (1, 3, s ⊕ r13).Z Gen random r14. Give A1 (1, 4, r14) and A4 (1, 4, s ⊕ r14).Z Gen random r23. Give A2 (2, 3, r23) and A3 (2, 3, s ⊕ r23).Z Gen random r24. Give A2 (2, 4, r24) and A4 (2, 4, s ⊕ r24).Z Gen random r34. Give A3 (3, 4, r34) and A4 (3, 4, s ⊕ r34).If any two get together they can find secret. No one person canfind the secret.

Page 49: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(t,m)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}n.For each t-set of A1, . . . ,Am we set up random strings so they canrecover the secret if they all get together. We omit details butmay be on HW.

Every t-subset does its own secret sharing, so LOTS of strings.

Page 50: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

(t,m)-Secret Sharing via Rand Strings

The secret is s ∈ {0, 1}n.For each t-set of A1, . . . ,Am we set up random strings so they canrecover the secret if they all get together. We omit details butmay be on HW.

Every t-subset does its own secret sharing, so LOTS of strings.

Page 51: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Ai Gets ??? Strings in (m/2,m)-Secret Sharing

If do (m/2,m) secret sharing then how many strings does A1 get?

A1 gets a string for every J ⊆ {1, . . . ,m}, |J| = m2 , 1 ∈ J.

Equivalent to:

A1 gets a string for every J ⊆ {2, . . . ,m}, |J| = m2 − 1.

How many sets? Discuss(m − 1m2 − 1

)∼ 2m√

mstrings

Thats A LOT of Strings!

Page 52: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Ai Gets ??? Strings in (m/2,m)-Secret Sharing

If do (m/2,m) secret sharing then how many strings does A1 get?

A1 gets a string for every J ⊆ {1, . . . ,m}, |J| = m2 , 1 ∈ J.

Equivalent to:

A1 gets a string for every J ⊆ {2, . . . ,m}, |J| = m2 − 1.

How many sets? Discuss(m − 1m2 − 1

)∼ 2m√

mstrings

Thats A LOT of Strings!

Page 53: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Ai Gets ??? Strings in (m/2,m)-Secret Sharing

If do (m/2,m) secret sharing then how many strings does A1 get?

A1 gets a string for every J ⊆ {1, . . . ,m}, |J| = m2 , 1 ∈ J.

Equivalent to:

A1 gets a string for every J ⊆ {2, . . . ,m}, |J| = m2 − 1.

How many sets? Discuss(m − 1m2 − 1

)∼ 2m√

mstrings

Thats A LOT of Strings!

Page 54: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Ai Gets ??? Strings in (m/2,m)-Secret Sharing

If do (m/2,m) secret sharing then how many strings does A1 get?

A1 gets a string for every J ⊆ {1, . . . ,m}, |J| = m2 , 1 ∈ J.

Equivalent to:

A1 gets a string for every J ⊆ {2, . . . ,m}, |J| = m2 − 1.

How many sets? Discuss

(m − 1m2 − 1

)∼ 2m√

mstrings

Thats A LOT of Strings!

Page 55: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Ai Gets ??? Strings in (m/2,m)-Secret Sharing

If do (m/2,m) secret sharing then how many strings does A1 get?

A1 gets a string for every J ⊆ {1, . . . ,m}, |J| = m2 , 1 ∈ J.

Equivalent to:

A1 gets a string for every J ⊆ {2, . . . ,m}, |J| = m2 − 1.

How many sets? Discuss(m − 1m2 − 1

)∼ 2m√

mstrings

Thats A LOT of Strings!

Page 56: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Ai Gets ??? Strings in (m/2,m)-Secret Sharing

If do (m/2,m) secret sharing then how many strings does A1 get?

A1 gets a string for every J ⊆ {1, . . . ,m}, |J| = m2 , 1 ∈ J.

Equivalent to:

A1 gets a string for every J ⊆ {2, . . . ,m}, |J| = m2 − 1.

How many sets? Discuss(m − 1m2 − 1

)∼ 2m√

mstrings

Thats A LOT of Strings!

Page 57: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 58: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 59: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 60: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 61: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 62: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 63: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 64: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 65: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.

I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 66: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking:

LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 67: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.

No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 68: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.

You can always do this with everyone getting 1 string that isthe same length as the secret

Page 69: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Reduce The Number of Strings for (m/2,m)?

In our (m/2,m)-scheme each Ai gets ∼ 2m√m

strings.

VOTE

1. Requires roughly 2m strings.

2. O(βm) strings for some 1 < β < 2 but not poly.

3. O(ma) strings for some a > 1 but not linear.

4. O(m) strings but not ma with a < 1.

5. O(ma) strings for some a < 1 but not logarithmic.

6. O(logm) strings but not constant.

7. O(1) strings.

You can always do this with everyone getting 1 string.I know what you are thinking: LOOOONG string.No.You can always do this with everyone getting 1 string that isthe same length as the secret

Page 70: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Secret Sharing With Polynomials: (3,6)

Def a ∼ b means a and b are close together,We do (3, 6)-Secret Sharing but technique works for any (t,m).

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.View s as a number in {0, . . . , p − 1}.

2. Zelda gen rand numbers a2, a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = a2x

2 + a1x + s.

4. Zelda gives A1 f (1), A2 f (2), . . ., A6 f (6) (all mod p). Theseare all of length |s| by padding with 0’s. Also give everyone p(does not count for length).

1. Any 3 have 3 points from f (x) so can find f (x), s.

2. Any 2 have 2 points from f (x). From these two points whatcan they conclude? NOTHING! If they know f (1) = 3 andf (2) = 7 and f is degree 2 then the constant term can beanything in {0, . . . , p}. So they know NOTHING about s.

Page 71: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Secret Sharing With Polynomials: (3,6)

Def a ∼ b means a and b are close together,We do (3, 6)-Secret Sharing but technique works for any (t,m).

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.View s as a number in {0, . . . , p − 1}.

2. Zelda gen rand numbers a2, a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = a2x

2 + a1x + s.

4. Zelda gives A1 f (1), A2 f (2), . . ., A6 f (6) (all mod p). Theseare all of length |s| by padding with 0’s. Also give everyone p(does not count for length).

1. Any 3 have 3 points from f (x) so can find f (x), s.

2. Any 2 have 2 points from f (x). From these two points whatcan they conclude? NOTHING! If they know f (1) = 3 andf (2) = 7 and f is degree 2 then the constant term can beanything in {0, . . . , p}. So they know NOTHING about s.

Page 72: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Secret Sharing With Polynomials: (3,6)

Def a ∼ b means a and b are close together,We do (3, 6)-Secret Sharing but technique works for any (t,m).

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.View s as a number in {0, . . . , p − 1}.

2. Zelda gen rand numbers a2, a1 ∈ {0, . . . , p − 1}

3. Zelda forms polynomial f (x) = a2x2 + a1x + s.

4. Zelda gives A1 f (1), A2 f (2), . . ., A6 f (6) (all mod p). Theseare all of length |s| by padding with 0’s. Also give everyone p(does not count for length).

1. Any 3 have 3 points from f (x) so can find f (x), s.

2. Any 2 have 2 points from f (x). From these two points whatcan they conclude? NOTHING! If they know f (1) = 3 andf (2) = 7 and f is degree 2 then the constant term can beanything in {0, . . . , p}. So they know NOTHING about s.

Page 73: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Secret Sharing With Polynomials: (3,6)

Def a ∼ b means a and b are close together,We do (3, 6)-Secret Sharing but technique works for any (t,m).

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.View s as a number in {0, . . . , p − 1}.

2. Zelda gen rand numbers a2, a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = a2x

2 + a1x + s.

4. Zelda gives A1 f (1), A2 f (2), . . ., A6 f (6) (all mod p). Theseare all of length |s| by padding with 0’s. Also give everyone p(does not count for length).

1. Any 3 have 3 points from f (x) so can find f (x), s.

2. Any 2 have 2 points from f (x). From these two points whatcan they conclude? NOTHING! If they know f (1) = 3 andf (2) = 7 and f is degree 2 then the constant term can beanything in {0, . . . , p}. So they know NOTHING about s.

Page 74: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Secret Sharing With Polynomials: (3,6)

Def a ∼ b means a and b are close together,We do (3, 6)-Secret Sharing but technique works for any (t,m).

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.View s as a number in {0, . . . , p − 1}.

2. Zelda gen rand numbers a2, a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = a2x

2 + a1x + s.

4. Zelda gives A1 f (1), A2 f (2), . . ., A6 f (6) (all mod p). Theseare all of length |s| by padding with 0’s. Also give everyone p(does not count for length).

1. Any 3 have 3 points from f (x) so can find f (x), s.

2. Any 2 have 2 points from f (x). From these two points whatcan they conclude? NOTHING! If they know f (1) = 3 andf (2) = 7 and f is degree 2 then the constant term can beanything in {0, . . . , p}. So they know NOTHING about s.

Page 75: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Secret Sharing With Polynomials: (3,6)

Def a ∼ b means a and b are close together,We do (3, 6)-Secret Sharing but technique works for any (t,m).

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.View s as a number in {0, . . . , p − 1}.

2. Zelda gen rand numbers a2, a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = a2x

2 + a1x + s.

4. Zelda gives A1 f (1), A2 f (2), . . ., A6 f (6) (all mod p). Theseare all of length |s| by padding with 0’s. Also give everyone p(does not count for length).

1. Any 3 have 3 points from f (x) so can find f (x), s.

2. Any 2 have 2 points from f (x). From these two points whatcan they conclude? NOTHING! If they know f (1) = 3 andf (2) = 7 and f is degree 2 then the constant term can beanything in {0, . . . , p}. So they know NOTHING about s.

Page 76: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Secret Sharing With Polynomials: (3,6)

Def a ∼ b means a and b are close together,We do (3, 6)-Secret Sharing but technique works for any (t,m).

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.View s as a number in {0, . . . , p − 1}.

2. Zelda gen rand numbers a2, a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = a2x

2 + a1x + s.

4. Zelda gives A1 f (1), A2 f (2), . . ., A6 f (6) (all mod p). Theseare all of length |s| by padding with 0’s. Also give everyone p(does not count for length).

1. Any 3 have 3 points from f (x) so can find f (x), s.

2. Any 2 have 2 points from f (x). From these two points whatcan they conclude?

NOTHING! If they know f (1) = 3 andf (2) = 7 and f is degree 2 then the constant term can beanything in {0, . . . , p}. So they know NOTHING about s.

Page 77: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Secret Sharing With Polynomials: (3,6)

Def a ∼ b means a and b are close together,We do (3, 6)-Secret Sharing but technique works for any (t,m).

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.View s as a number in {0, . . . , p − 1}.

2. Zelda gen rand numbers a2, a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = a2x

2 + a1x + s.

4. Zelda gives A1 f (1), A2 f (2), . . ., A6 f (6) (all mod p). Theseare all of length |s| by padding with 0’s. Also give everyone p(does not count for length).

1. Any 3 have 3 points from f (x) so can find f (x), s.

2. Any 2 have 2 points from f (x). From these two points whatcan they conclude? NOTHING!

If they know f (1) = 3 andf (2) = 7 and f is degree 2 then the constant term can beanything in {0, . . . , p}. So they know NOTHING about s.

Page 78: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Secret Sharing With Polynomials: (3,6)

Def a ∼ b means a and b are close together,We do (3, 6)-Secret Sharing but technique works for any (t,m).

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.View s as a number in {0, . . . , p − 1}.

2. Zelda gen rand numbers a2, a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = a2x

2 + a1x + s.

4. Zelda gives A1 f (1), A2 f (2), . . ., A6 f (6) (all mod p). Theseare all of length |s| by padding with 0’s. Also give everyone p(does not count for length).

1. Any 3 have 3 points from f (x) so can find f (x), s.

2. Any 2 have 2 points from f (x). From these two points whatcan they conclude? NOTHING! If they know f (1) = 3 andf (2) = 7 and f is degree 2 then the constant term can beanything in {0, . . . , p}. So they know NOTHING about s.

Page 79: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: (t,m)

Zelda wants to give strings to A1, . . . ,Am such that

Any t of A1, . . . ,Am can find s. Any t − 1 learn NOTHING.

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.

2. Zelda gen rand at−1, . . . , a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = at−1x

t−1 + · · ·+ a1x + s.

4. For 1 ≤ i ≤ m Zelda gives Ai f (i) mod p.

1. Any t have t points from f (x) so can find f (x), s.

2. Any t − 1 have t − 1 points from f (x). From these t − 1points what can they conclude? NOTHING! Any constantterm is consistent with what they know.‘ So they knowNOTHING about s.

Page 80: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: (t,m)

Zelda wants to give strings to A1, . . . ,Am such that

Any t of A1, . . . ,Am can find s. Any t − 1 learn NOTHING.

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.

2. Zelda gen rand at−1, . . . , a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = at−1x

t−1 + · · ·+ a1x + s.

4. For 1 ≤ i ≤ m Zelda gives Ai f (i) mod p.

1. Any t have t points from f (x) so can find f (x), s.

2. Any t − 1 have t − 1 points from f (x). From these t − 1points what can they conclude? NOTHING! Any constantterm is consistent with what they know.‘ So they knowNOTHING about s.

Page 81: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: (t,m)

Zelda wants to give strings to A1, . . . ,Am such that

Any t of A1, . . . ,Am can find s. Any t − 1 learn NOTHING.

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.

2. Zelda gen rand at−1, . . . , a1 ∈ {0, . . . , p − 1}

3. Zelda forms polynomial f (x) = at−1xt−1 + · · ·+ a1x + s.

4. For 1 ≤ i ≤ m Zelda gives Ai f (i) mod p.

1. Any t have t points from f (x) so can find f (x), s.

2. Any t − 1 have t − 1 points from f (x). From these t − 1points what can they conclude? NOTHING! Any constantterm is consistent with what they know.‘ So they knowNOTHING about s.

Page 82: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: (t,m)

Zelda wants to give strings to A1, . . . ,Am such that

Any t of A1, . . . ,Am can find s. Any t − 1 learn NOTHING.

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.

2. Zelda gen rand at−1, . . . , a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = at−1x

t−1 + · · ·+ a1x + s.

4. For 1 ≤ i ≤ m Zelda gives Ai f (i) mod p.

1. Any t have t points from f (x) so can find f (x), s.

2. Any t − 1 have t − 1 points from f (x). From these t − 1points what can they conclude? NOTHING! Any constantterm is consistent with what they know.‘ So they knowNOTHING about s.

Page 83: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: (t,m)

Zelda wants to give strings to A1, . . . ,Am such that

Any t of A1, . . . ,Am can find s. Any t − 1 learn NOTHING.

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.

2. Zelda gen rand at−1, . . . , a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = at−1x

t−1 + · · ·+ a1x + s.

4. For 1 ≤ i ≤ m Zelda gives Ai f (i) mod p.

1. Any t have t points from f (x) so can find f (x), s.

2. Any t − 1 have t − 1 points from f (x). From these t − 1points what can they conclude? NOTHING! Any constantterm is consistent with what they know.‘ So they knowNOTHING about s.

Page 84: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: (t,m)

Zelda wants to give strings to A1, . . . ,Am such that

Any t of A1, . . . ,Am can find s. Any t − 1 learn NOTHING.

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.

2. Zelda gen rand at−1, . . . , a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = at−1x

t−1 + · · ·+ a1x + s.

4. For 1 ≤ i ≤ m Zelda gives Ai f (i) mod p.

1. Any t have t points from f (x) so can find f (x), s.

2. Any t − 1 have t − 1 points from f (x). From these t − 1points what can they conclude? NOTHING! Any constantterm is consistent with what they know.‘ So they knowNOTHING about s.

Page 85: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: (t,m)

Zelda wants to give strings to A1, . . . ,Am such that

Any t of A1, . . . ,Am can find s. Any t − 1 learn NOTHING.

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.

2. Zelda gen rand at−1, . . . , a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = at−1x

t−1 + · · ·+ a1x + s.

4. For 1 ≤ i ≤ m Zelda gives Ai f (i) mod p.

1. Any t have t points from f (x) so can find f (x), s.

2. Any t − 1 have t − 1 points from f (x). From these t − 1points what can they conclude?

NOTHING! Any constantterm is consistent with what they know.‘ So they knowNOTHING about s.

Page 86: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: (t,m)

Zelda wants to give strings to A1, . . . ,Am such that

Any t of A1, . . . ,Am can find s. Any t − 1 learn NOTHING.

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.

2. Zelda gen rand at−1, . . . , a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = at−1x

t−1 + · · ·+ a1x + s.

4. For 1 ≤ i ≤ m Zelda gives Ai f (i) mod p.

1. Any t have t points from f (x) so can find f (x), s.

2. Any t − 1 have t − 1 points from f (x). From these t − 1points what can they conclude? NOTHING!

Any constantterm is consistent with what they know.‘ So they knowNOTHING about s.

Page 87: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: (t,m)

Zelda wants to give strings to A1, . . . ,Am such that

Any t of A1, . . . ,Am can find s. Any t − 1 learn NOTHING.

1. Secret s. Zelda picks prime p ∼ 2|s|, Zelda works mod p.

2. Zelda gen rand at−1, . . . , a1 ∈ {0, . . . , p − 1}3. Zelda forms polynomial f (x) = at−1x

t−1 + · · ·+ a1x + s.

4. For 1 ≤ i ≤ m Zelda gives Ai f (i) mod p.

1. Any t have t points from f (x) so can find f (x), s.

2. Any t − 1 have t − 1 points from f (x). From these t − 1points what can they conclude? NOTHING! Any constantterm is consistent with what they know.‘ So they knowNOTHING about s.

Page 88: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Example

(3, 6) secret sharing.s = (10100)2 = 20. We’ll use p = 37. (We will see why later.)

1. Zelda picks a2 = 8 and a1 = 13.

2. Zelda forms polynomial f (x) = 8x2 + 13x + 20.

3. Zelda gives A1 f (1) = 4, A2 f (2) = 4, A3 f (3) = 20, A4

f (4) = 15, A5 f (5) = 26, A6 f (6) = 16.

If A1,A3,A4 get together and want to find f (x) hence s.f (x) = a2x

2 + a1x + s.f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)f (4) = 15: a2 × 42 + a1 × 4 + s ≡ 14 (mod 37)3 linear equations in 3 variables, over mod 37 can be solved.Note Only need constant term s but can get all coeffs.

Page 89: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Example

(3, 6) secret sharing.s = (10100)2 = 20. We’ll use p = 37. (We will see why later.)

1. Zelda picks a2 = 8 and a1 = 13.

2. Zelda forms polynomial f (x) = 8x2 + 13x + 20.

3. Zelda gives A1 f (1) = 4, A2 f (2) = 4, A3 f (3) = 20, A4

f (4) = 15, A5 f (5) = 26, A6 f (6) = 16.

If A1,A3,A4 get together and want to find f (x) hence s.f (x) = a2x

2 + a1x + s.f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)f (4) = 15: a2 × 42 + a1 × 4 + s ≡ 14 (mod 37)3 linear equations in 3 variables, over mod 37 can be solved.Note Only need constant term s but can get all coeffs.

Page 90: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Example

(3, 6) secret sharing.s = (10100)2 = 20. We’ll use p = 37. (We will see why later.)

1. Zelda picks a2 = 8 and a1 = 13.

2. Zelda forms polynomial f (x) = 8x2 + 13x + 20.

3. Zelda gives A1 f (1) = 4, A2 f (2) = 4, A3 f (3) = 20, A4

f (4) = 15, A5 f (5) = 26, A6 f (6) = 16.

If A1,A3,A4 get together and want to find f (x) hence s.f (x) = a2x

2 + a1x + s.f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)f (4) = 15: a2 × 42 + a1 × 4 + s ≡ 14 (mod 37)3 linear equations in 3 variables, over mod 37 can be solved.Note Only need constant term s but can get all coeffs.

Page 91: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Example

(3, 6) secret sharing.s = (10100)2 = 20. We’ll use p = 37. (We will see why later.)

1. Zelda picks a2 = 8 and a1 = 13.

2. Zelda forms polynomial f (x) = 8x2 + 13x + 20.

3. Zelda gives A1 f (1) = 4, A2 f (2) = 4, A3 f (3) = 20, A4

f (4) = 15, A5 f (5) = 26, A6 f (6) = 16.

If A1,A3,A4 get together and want to find f (x) hence s.f (x) = a2x

2 + a1x + s.f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)f (4) = 15: a2 × 42 + a1 × 4 + s ≡ 14 (mod 37)3 linear equations in 3 variables, over mod 37 can be solved.Note Only need constant term s but can get all coeffs.

Page 92: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Example

(3, 6) secret sharing.s = (10100)2 = 20. We’ll use p = 37. (We will see why later.)

1. Zelda picks a2 = 8 and a1 = 13.

2. Zelda forms polynomial f (x) = 8x2 + 13x + 20.

3. Zelda gives A1 f (1) = 4, A2 f (2) = 4, A3 f (3) = 20, A4

f (4) = 15, A5 f (5) = 26, A6 f (6) = 16.

If A1,A3,A4 get together and want to find f (x) hence s.f (x) = a2x

2 + a1x + s.f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)f (4) = 15: a2 × 42 + a1 × 4 + s ≡ 14 (mod 37)

3 linear equations in 3 variables, over mod 37 can be solved.Note Only need constant term s but can get all coeffs.

Page 93: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Example

(3, 6) secret sharing.s = (10100)2 = 20. We’ll use p = 37. (We will see why later.)

1. Zelda picks a2 = 8 and a1 = 13.

2. Zelda forms polynomial f (x) = 8x2 + 13x + 20.

3. Zelda gives A1 f (1) = 4, A2 f (2) = 4, A3 f (3) = 20, A4

f (4) = 15, A5 f (5) = 26, A6 f (6) = 16.

If A1,A3,A4 get together and want to find f (x) hence s.f (x) = a2x

2 + a1x + s.f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)f (4) = 15: a2 × 42 + a1 × 4 + s ≡ 14 (mod 37)3 linear equations in 3 variables, over mod 37 can be solved.

Note Only need constant term s but can get all coeffs.

Page 94: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Example

(3, 6) secret sharing.s = (10100)2 = 20. We’ll use p = 37. (We will see why later.)

1. Zelda picks a2 = 8 and a1 = 13.

2. Zelda forms polynomial f (x) = 8x2 + 13x + 20.

3. Zelda gives A1 f (1) = 4, A2 f (2) = 4, A3 f (3) = 20, A4

f (4) = 15, A5 f (5) = 26, A6 f (6) = 16.

If A1,A3,A4 get together and want to find f (x) hence s.f (x) = a2x

2 + a1x + s.f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)f (4) = 15: a2 × 42 + a1 × 4 + s ≡ 14 (mod 37)3 linear equations in 3 variables, over mod 37 can be solved.Note Only need constant term s but can get all coeffs.

Page 95: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What if Two Get Together?

What if A1 and A3 get together:f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)Can they solve these to find s Discuss.

No. However, can they use these equations to eliminate somevalues of s? Discuss.

No. ANY s is consistent. If you pick a value of s, you then havetwo equations in two variables that can be solved.

Important Information-Theoretic Secure: if A1 and A3 meet theylearn NOTHING. If they had big fancy supercomputers they wouldstill learn NOTHING.

Page 96: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What if Two Get Together?

What if A1 and A3 get together:f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)Can they solve these to find s Discuss.

No. However, can they use these equations to eliminate somevalues of s? Discuss.

No. ANY s is consistent. If you pick a value of s, you then havetwo equations in two variables that can be solved.

Important Information-Theoretic Secure: if A1 and A3 meet theylearn NOTHING. If they had big fancy supercomputers they wouldstill learn NOTHING.

Page 97: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What if Two Get Together?

What if A1 and A3 get together:f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)Can they solve these to find s Discuss.

No. However, can they use these equations to eliminate somevalues of s? Discuss.

No. ANY s is consistent. If you pick a value of s, you then havetwo equations in two variables that can be solved.

Important Information-Theoretic Secure: if A1 and A3 meet theylearn NOTHING. If they had big fancy supercomputers they wouldstill learn NOTHING.

Page 98: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What if Two Get Together?

What if A1 and A3 get together:f (1) = 4: a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)f (3) = 20: a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)Can they solve these to find s Discuss.

No. However, can they use these equations to eliminate somevalues of s? Discuss.

No. ANY s is consistent. If you pick a value of s, you then havetwo equations in two variables that can be solved.

Important Information-Theoretic Secure: if A1 and A3 meet theylearn NOTHING. If they had big fancy supercomputers they wouldstill learn NOTHING.

Page 99: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

A Note About Linear Equations

The three equations below, over mod 37, can be solved:a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)a2 × 42 + a1 × 4 + s ≡ 15 (mod 37)

Could we have solved this had we used mod 32?VOTE

1. YES

2. NO

These equations, Don’t know, but in general, NONeed a domain where every number has a mult inverse.Over mod p, p primes, all numbers have mult inverses.Over mod 32, even numbers do not have mult inverse.

Page 100: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

A Note About Linear Equations

The three equations below, over mod 37, can be solved:a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)a2 × 42 + a1 × 4 + s ≡ 15 (mod 37)

Could we have solved this had we used mod 32?VOTE

1. YES

2. NO

These equations, Don’t know, but in general, NONeed a domain where every number has a mult inverse.Over mod p, p primes, all numbers have mult inverses.Over mod 32, even numbers do not have mult inverse.

Page 101: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

A Note About Linear Equations

The three equations below, over mod 37, can be solved:a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)a2 × 42 + a1 × 4 + s ≡ 15 (mod 37)

Could we have solved this had we used mod 32?VOTE

1. YES

2. NO

These equations, Don’t know, but in general, NONeed a domain where every number has a mult inverse.Over mod p, p primes, all numbers have mult inverses.Over mod 32, even numbers do not have mult inverse.

Page 102: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

A Note About Linear Equations

The three equations below, over mod 37, can be solved:a2 × 12 + a1 × 1 + s ≡ 4 (mod 37)a2 × 32 + a1 × 3 + s ≡ 20 (mod 37)a2 × 42 + a1 × 4 + s ≡ 15 (mod 37)

Could we have solved this had we used mod 32?VOTE

1. YES

2. NO

These equations, Don’t know, but in general, NONeed a domain where every number has a mult inverse.Over mod p, p primes, all numbers have mult inverses.Over mod 32, even numbers do not have mult inverse.

Page 103: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What Prime to Pick?

The secret was s = 10100. We will work over mod p.

1. p has to be a prime since when 3 people get together theyneed to solve 3 equations in 3 variables.

2. 10100 has to be in {0, . . . , p − 1}. Could I pick 31?

3. The players know that secret is length 5. So if (say)11111 /∈ {0, . . . , p − 1} they will know s 6= 11111.

Upshot Take least prime p such that ALL strings of length |s|interpreted as a number in binary are in {0, . . . , p − 1}.Our Case s = (10100)2 = 20. Use smallest prime p such that(11111)2 = 32 ≤ p − 1. That is p = 37.

Page 104: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What Prime to Pick?

The secret was s = 10100. We will work over mod p.

1. p has to be a prime since when 3 people get together theyneed to solve 3 equations in 3 variables.

2. 10100 has to be in {0, . . . , p − 1}. Could I pick 31?

3. The players know that secret is length 5. So if (say)11111 /∈ {0, . . . , p − 1} they will know s 6= 11111.

Upshot Take least prime p such that ALL strings of length |s|interpreted as a number in binary are in {0, . . . , p − 1}.Our Case s = (10100)2 = 20. Use smallest prime p such that(11111)2 = 32 ≤ p − 1. That is p = 37.

Page 105: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What Prime to Pick?

The secret was s = 10100. We will work over mod p.

1. p has to be a prime since when 3 people get together theyneed to solve 3 equations in 3 variables.

2. 10100 has to be in {0, . . . , p − 1}.

Could I pick 31?

3. The players know that secret is length 5. So if (say)11111 /∈ {0, . . . , p − 1} they will know s 6= 11111.

Upshot Take least prime p such that ALL strings of length |s|interpreted as a number in binary are in {0, . . . , p − 1}.Our Case s = (10100)2 = 20. Use smallest prime p such that(11111)2 = 32 ≤ p − 1. That is p = 37.

Page 106: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What Prime to Pick?

The secret was s = 10100. We will work over mod p.

1. p has to be a prime since when 3 people get together theyneed to solve 3 equations in 3 variables.

2. 10100 has to be in {0, . . . , p − 1}. Could I pick 31?

3. The players know that secret is length 5. So if (say)11111 /∈ {0, . . . , p − 1} they will know s 6= 11111.

Upshot Take least prime p such that ALL strings of length |s|interpreted as a number in binary are in {0, . . . , p − 1}.Our Case s = (10100)2 = 20. Use smallest prime p such that(11111)2 = 32 ≤ p − 1. That is p = 37.

Page 107: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What Prime to Pick?

The secret was s = 10100. We will work over mod p.

1. p has to be a prime since when 3 people get together theyneed to solve 3 equations in 3 variables.

2. 10100 has to be in {0, . . . , p − 1}. Could I pick 31?

3. The players know that secret is length 5. So if (say)11111 /∈ {0, . . . , p − 1} they will know s 6= 11111.

Upshot Take least prime p such that ALL strings of length |s|interpreted as a number in binary are in {0, . . . , p − 1}.Our Case s = (10100)2 = 20. Use smallest prime p such that(11111)2 = 32 ≤ p − 1. That is p = 37.

Page 108: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What Prime to Pick?

The secret was s = 10100. We will work over mod p.

1. p has to be a prime since when 3 people get together theyneed to solve 3 equations in 3 variables.

2. 10100 has to be in {0, . . . , p − 1}. Could I pick 31?

3. The players know that secret is length 5. So if (say)11111 /∈ {0, . . . , p − 1} they will know s 6= 11111.

Upshot Take least prime p such that ALL strings of length |s|interpreted as a number in binary are in {0, . . . , p − 1}.

Our Case s = (10100)2 = 20. Use smallest prime p such that(11111)2 = 32 ≤ p − 1. That is p = 37.

Page 109: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

What Prime to Pick?

The secret was s = 10100. We will work over mod p.

1. p has to be a prime since when 3 people get together theyneed to solve 3 equations in 3 variables.

2. 10100 has to be in {0, . . . , p − 1}. Could I pick 31?

3. The players know that secret is length 5. So if (say)11111 /∈ {0, . . . , p − 1} they will know s 6= 11111.

Upshot Take least prime p such that ALL strings of length |s|interpreted as a number in binary are in {0, . . . , p − 1}.Our Case s = (10100)2 = 20. Use smallest prime p such that(11111)2 = 32 ≤ p − 1. That is p = 37.

Page 110: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Threshold Secret Sharing With Polynomials: Ref

Due to Adi ShamirHow to Share a SecretCommunication of the ACMVolume 22, Number 111979

Page 111: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

We Used Polynomials. Could Use. . .

What did we use about degree t − 1 polynomials?

1. t points determine the polynomial (we need constant term).

2. t − 1 points give no information about constant term.

Could do geometry over Z3p. A Plane in Z3

p is:

{(x , y , z) : ax + by + cz = d}

1. 3 points in Z3p determine a plane.

2. 2 points in Z3p give no information about d .

This approach is due to George Blakely, SafeguardingCryptographic Keys, International Workshop on ManagingRequirements, Vol 48, 1979.We will not do secret sharing this way, though one could.

Page 112: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

We Used Polynomials. Could Use. . .

What did we use about degree t − 1 polynomials?

1. t points determine the polynomial (we need constant term).

2. t − 1 points give no information about constant term.

Could do geometry over Z3p. A Plane in Z3

p is:

{(x , y , z) : ax + by + cz = d}

1. 3 points in Z3p determine a plane.

2. 2 points in Z3p give no information about d .

This approach is due to George Blakely, SafeguardingCryptographic Keys, International Workshop on ManagingRequirements, Vol 48, 1979.We will not do secret sharing this way, though one could.

Page 113: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

We Used Polynomials. Could Use. . .

What did we use about degree t − 1 polynomials?

1. t points determine the polynomial (we need constant term).

2. t − 1 points give no information about constant term.

Could do geometry over Z3p. A Plane in Z3

p is:

{(x , y , z) : ax + by + cz = d}

1. 3 points in Z3p determine a plane.

2. 2 points in Z3p give no information about d .

This approach is due to George Blakely, SafeguardingCryptographic Keys, International Workshop on ManagingRequirements, Vol 48, 1979.We will not do secret sharing this way, though one could.

Page 114: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

We Used Polynomials. Could Use. . .

What did we use about degree t − 1 polynomials?

1. t points determine the polynomial (we need constant term).

2. t − 1 points give no information about constant term.

Could do geometry over Z3p. A Plane in Z3

p is:

{(x , y , z) : ax + by + cz = d}

1. 3 points in Z3p determine a plane.

2. 2 points in Z3p give no information about d .

This approach is due to George Blakely, SafeguardingCryptographic Keys, International Workshop on ManagingRequirements, Vol 48, 1979.We will not do secret sharing this way, though one could.

Page 115: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

We Used Polynomials. Could Use. . .

What did we use about degree t − 1 polynomials?

1. t points determine the polynomial (we need constant term).

2. t − 1 points give no information about constant term.

Could do geometry over Z3p. A Plane in Z3

p is:

{(x , y , z) : ax + by + cz = d}

1. 3 points in Z3p determine a plane.

2. 2 points in Z3p give no information about d .

This approach is due to George Blakely, SafeguardingCryptographic Keys, International Workshop on ManagingRequirements, Vol 48, 1979.We will not do secret sharing this way, though one could.

Page 116: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

We Used Polynomials. Could Use. . .

What did we use about degree t − 1 polynomials?

1. t points determine the polynomial (we need constant term).

2. t − 1 points give no information about constant term.

Could do geometry over Z3p. A Plane in Z3

p is:

{(x , y , z) : ax + by + cz = d}

1. 3 points in Z3p determine a plane.

2. 2 points in Z3p give no information about d .

This approach is due to George Blakely, SafeguardingCryptographic Keys, International Workshop on ManagingRequirements, Vol 48, 1979.We will not do secret sharing this way, though one could.

Page 117: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

We Used Polynomials. Could Use. . .

We won’t go into details but there are two ways to use theChinese Remainder Thm to do Secret Sharing.

Due to:C.A. Asmuth and J. Bloom. A modular approach to keysafeguarding. IEEE Transactions on Information Theory Vol29, Number 2, 208-210, 1983.

And Independently

M. Mignotte How to share a secret, Cryptography:Proceedings of the Workshop on Cryptography, BurgDeursetein, Volume 149 of Lecture Notes in ComputerScience, 1982.

Page 118: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Features and Caveats of Poly Method

Imagine that you’ve done (t,m) secret sharing with polynomial,p(x). So for 1 ≤ i ≤ m, Ai has f (i).

1. Feature If more people come FINE- can extend to (t,m + a)by giving Am+1, f (m + 1), . . ., Am+a, f (m + a).

2. Caveat If m ≥ p then you run out of points to give people.There are ways to deal with this, but we will not bother. Wewill always assume m < p.

Page 119: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Features and Caveats of Poly Method

Imagine that you’ve done (t,m) secret sharing with polynomial,p(x). So for 1 ≤ i ≤ m, Ai has f (i).

1. Feature If more people come FINE- can extend to (t,m + a)by giving Am+1, f (m + 1), . . ., Am+a, f (m + a).

2. Caveat If m ≥ p then you run out of points to give people.There are ways to deal with this, but we will not bother. Wewill always assume m < p.

Page 120: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

Features and Caveats of Poly Method

Imagine that you’ve done (t,m) secret sharing with polynomial,p(x). So for 1 ≤ i ≤ m, Ai has f (i).

1. Feature If more people come FINE- can extend to (t,m + a)by giving Am+1, f (m + 1), . . ., Am+a, f (m + a).

2. Caveat If m ≥ p then you run out of points to give people.There are ways to deal with this, but we will not bother. Wewill always assume m < p.

Page 121: BILL START RECORDING LECTURE · 2020. 12. 2. · Threshold Secret Sharing Zelda has a secret s 2f0;1gn. Def Let 1 t m. (t;m)-secret sharing is a way for Zelda to give strings to A

BILL STOPRECORDING LECTURE