# Foundations of Cryptography | NPTEL | Week 12 Assignment Solutions

This set of MCQ(multiple choice questions) focuses on the Foundations of Cryptography NPTEL Week 12 Assignment Solutions.

NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Foundations of Cryptography NPTEL Week 12 Assignment Solution” contains 05 questions.

Now, start attempting the quiz.

### Foundations of Cryptography NPTEL Week 12 Assignment Solutions

Q1. For Shamir secret sharing scheme:

a) The correctness holds if the Lagrangeâ€™s interpolation is performed over a ring
b) The correctness holds if the Lagrangeâ€™s interpolation is performed over the integers
c) The privacy does not hold if the secret is set to be any other coefficient of the sharing polynomial, except the constant term
d) None of these option

Q2. Which of the following is/are true for additive secret-sharing?

a) The shares of up to n-1 parties need not be communicated, if the adversary is computationally bounded and if there is a pre-shared, uniformly random and private PRF key between the dealer and every share-holder
b) Irrespective of the kind of setup available, the shares of every share-holder have to be communicated, even if the adversary is computationally bounded
c) The shares of any party need not be communicated, if the adversary is computationally bounded and if there is a pre-shared, uniformly random and private PRF key between the dealer and every share-holder
d) None of these option

Q3. Consider the following variant of additive secret-sharing for sharing a n-bit secret among n share-holders P1,â€¦,Pn where up to n-1 share-holders could be corrupt: to share an n-bit secret s=(s1,â€¦,sn), where s1,â€¦,sn are the bits of the secret s, the dealer gives party Pi the share si

a) The scheme provides perfect security
b) The scheme provides computational security
c) The scheme is secure provided n is sufficiently large
d) None of these option

Q4. For the additive secret-sharing scheme:

a) The operations have to be necessarily performed over a ring
b) The operations have to be necessarily performed over a field
c) The privacy holds against a computationally unbounded adversary
d) The privacy property is guaranteed only if the adversary is computationally bounded

Q5. Which of the following is/are true for Shamir secret-sharing?

a) The shares of up to t parties need not be communicated, if the adversary is computationally bounded and if there is a pre-shared, uniformly random and private PRF key between the dealer and every share-holder
b) Irrespective of the kind of setup available, the shares of every share-holder have to be communicated, even if the adversary is computationally bounded
c) The shares of any party need not be communicated, if the adversary is computationally bounded and if there is a pre-shared, uniformly random and private PRF key between the dealer and every share-holder
d) None of these option

`DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.`