Foundations of Cryptography | NPTEL | Week 12 Assignment Solutions

This set of MCQ(multiple choice questions) focuses on the Foundations of Cryptography NPTEL Week 12 Assignment Solutions.

Course Layout (Answers Link)

NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Foundations of Cryptography NPTEL Week 12 Assignment Solution” contains 05 questions.

Now, start attempting the quiz.

Foundations of Cryptography NPTEL Week 12 Assignment Solutions

Q1. For Shamir secret sharing scheme:

a) The correctness holds if the Lagrange’s interpolation is performed over a ring
b) The correctness holds if the Lagrange’s interpolation is performed over the integers
c) The privacy does not hold if the secret is set to be any other coefficient of the sharing polynomial, except the constant term
d) None of these option

Answer: d)

Q2. Which of the following is/are true for additive secret-sharing?

a) The shares of up to n-1 parties need not be communicated, if the adversary is computationally bounded and if there is a pre-shared, uniformly random and private PRF key between the dealer and every share-holder
b) Irrespective of the kind of setup available, the shares of every share-holder have to be communicated, even if the adversary is computationally bounded
c) The shares of any party need not be communicated, if the adversary is computationally bounded and if there is a pre-shared, uniformly random and private PRF key between the dealer and every share-holder
d) None of these option

Answer: a)

Q3. Consider the following variant of additive secret-sharing for sharing a n-bit secret among n share-holders P1,…,Pn where up to n-1 share-holders could be corrupt: to share an n-bit secret s=(s1,…,sn), where s1,…,sn are the bits of the secret s, the dealer gives party Pi the share si

a) The scheme provides perfect security
b) The scheme provides computational security
c) The scheme is secure provided n is sufficiently large
d) None of these option

Answer: d)

Q4. For the additive secret-sharing scheme:

a) The operations have to be necessarily performed over a ring
b) The operations have to be necessarily performed over a field
c) The privacy holds against a computationally unbounded adversary
d) The privacy property is guaranteed only if the adversary is computationally bounded

Answer: c)

Q5. Which of the following is/are true for Shamir secret-sharing?

a) The shares of up to t parties need not be communicated, if the adversary is computationally bounded and if there is a pre-shared, uniformly random and private PRF key between the dealer and every share-holder
b) Irrespective of the kind of setup available, the shares of every share-holder have to be communicated, even if the adversary is computationally bounded
c) The shares of any party need not be communicated, if the adversary is computationally bounded and if there is a pre-shared, uniformly random and private PRF key between the dealer and every share-holder
d) None of these option

Answer: a)

Foundations of Cryptography NPTEL Week 8 Assignment Solutions

<< Prev- Foundations of Cryptography NPTEL Week 10 Solutions

DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *