Application: Secret sharing
Four of us (Ariel, Amelia, Benjawan, Parinya) are working on the lecture notes for the course. Each person's mood is unpredictable and on a bad day one may decide to erase all the course documents.
To protect the course documents from these unpredictable people, a protocol is created.1
- Every subset of three persons are given a permission to erase the course documents.
- No subset of two persons can erase any content.
How can we design such a scheme?
Let us consider a more abstract setting. We have players in a group, and the goal is to make sure that it requires (any combination of) players to open the document but a group of players can never access it. We can protect a document by some secret password (some integer). Pick a polynomial of degree such that (where is a prime larger than and ). Evaluate the polynomial at , i.e., . We give the code to player . The following lemma is a direct application of Theorem 44.
Any group of players can access the value of .
Let be the set of players. From Theorem 44, there exists a unique polynomial of degree such that (the Lagrange polynomial), so it must be the case that . We can compute to get the secret password.
Next, we want to argue that any group of individuals can "learn nothing" about the secret value . Here, we must first agree on some definition. What does it mean for someone to "learn nothing" in this case? We will go with the following notion.
Let us say that Ariel and Benjawan try to collude to mess up the lecture notes. Combining their information and , let us say that is the set of polynomials that agree with these points. We say that nothing can be learned if, for all ,
under a uniform distribution on . This means that, given the information from Benjawan and Ariel, the secret is equally likely to be any of the numbers in . Another way to view this is that there is no "information leak" from this collusion.
Using probabilistic statements to formulate a concept (e.g., the concept here is information leakage) is ubiquitous in computer science. This happens to be the first example we see in this course, but we are sure you will see many more such examples in the future.
Let be a subset of collusion of size less than . Then there is no information leak from this collusion.
This relies on Exercise 122. Suppose is a subset of players that collude and
be their points that came from the evaluations of the secret polynomial (where ). Let be the polynomials that agree with these points, so from Exercise 122, we have that . For each , define , and . Again, from Exercise 122, we have .
This implies the desired result.
Pick a random degree- polynomial (with a prime) using the following random process. For each , pick a coefficient uniformly at random. Define . What is the expected number of roots of ?
Footnotes
-
Economic models have long made assumptions about people being rational, until recent decades when this assumption was greatly challenged (e.g., by the late great psychologist Daniel Kahneman whose work was awarded the Nobel Prize in Economics). So, people in fact do not make rational choices in life and they are often not aware when they are not rational. ↩