Skip to main content

Section 38 The Matrix of a Linear Transformation

Subsection Application: Secret Sharing Algorithms

Suppose we have a secret that we want or need to share with several individuals. For example, a bank manager might want to share pieces of the code for the bank vault with several employees so that if the manager is not available, some subset of these employees could open the vault if they work together. This allows for a significant amount of security while still making the code available if needed. As another example, in order to keep passwords secure (as they can be hard to remember), a person could implement a secret sharing scheme. The person would generate a set of shares for a given password and store them in several different places. If the person forgets the password, it can be reconstructed by collecting some set of these shares. Since the shares can be stored in many different places, the password is relatively secure.

The idea behind secret sharing algorithms is to break a secret into a number (n) of pieces and give each person one piece. A code is then created in such a way that any k individuals could combine their information and learn the secret, but no group of fewer than k individuals could. This is called a (k,n) threshold scheme. One secret sharing algorithm is Shamir's Secret Sharing, which, as we will see later in this section, involves Lagrange polynomials. In order to implement this algorithm, we will use matrices of linear transformations from polynomials spaces to Rn.

Subsection Introduction

A matrix transformation T from Rn to Rm is a linear transformation defined by T(x)=Ax for some m×n matrix A. We can use the matrix to quickly determine if T is one-to-one or onto — if every column of A contains a pivot, then T is one-to-one, and if every row of A contains a pivot, then T is onto. As we will see, we can represent any linear transformation between finite dimensional vector spaces as a matrix transformation, which will allow us to use all of the tools we have developed for matrices to study linear transformations. We will begin with linear transformations from Rn to Rm.

Preview Activity 38.1.

Let T be a linear transformation from R2 into R3. Let's also say that we know the following information about T:

T([10])=[021] and T([01])=[132].
(a)

Find T([20]).

Hint.

Use the fact that T is a linear transformation.

(b)

Find T([11]).

(c)

Find T([23]).

(d)

Find T([ab]) for any real numbers a and b.

(e)

Is it possible to find a matrix A so that T([ab])=A[ab] for any real numbers a and b? If so, what is this matrix? If not, why not?

Subsection Linear Transformations from Rn to Rm

Preview Activity 38.1 illustrates the method for representing a linear transformation from Rn to Rm as a matrix transformation. We now consider the general context.

Activity 38.2.

Let T be a linear transformation from Rn to Rm. Let ei be the ith column of the n×n identity matrix. In other words,

e1=[10000],e2=[01000],e3=[00100],,en=[0001]

in Rn. The set {e1,e2,,en} is the standard basis for Rn. Let x=[x1x2 xn] in Rn. Explain why T(x)=Ax for every x in Rn, where

A=[ T(e1)T(e2)T(en) ]

is the matrix with columns T(e1), T(e2), , T(en).

As we discovered in Activity 38.2, a linear transformation from Rn to Rm can be expressed as a matrix transformation where the columns of the matrix are given by the images of ei, the columns of the n×n identity matrix. This matrix is called the standard matrix of the linear transformation.

Definition 38.1.

If T is a linear transformation from Rn to Rm, the standard matrix for T is the matrix

A=[ T(e1)T(e2)T(en) ]

with columns T(e1), T(e2), , T(en), where {e1,e2,,en} is the standard basis for Rn. More specifically, T(x)=Ax for every x in Rn.

Subsection The Matrix of a Linear Transformation

We saw in the previous section that any linear transformation T from Rn to Rm is in fact a matrix transformation. In this section, we turn to the general question — can any linear transformation T:VW between an n-dimensional vector space V and an m-dimensional vector space W be represented in some way as a matrix transformation? This will allow us to extend ideas like eigenvalues and eigenvectors to arbitrary linear transformations. We begin by investigating an example.

The general process for representing a linear transformation as a matrix transformation is as described in Activity 38.3.

Activity 38.3.

Let V be an n dimensional vector space and W an m dimensional vector space and suppose T:VW is a linear transformation. Let B={v1,v2,,vn} be a basis for V and C={w1,w2,,wm} a basis for W. Let v be in V so that

v=c1v1+c2v2++cnvn

for some scalars c1, c2, , cn.

(a)

What is [v]B?

(b)

Note that for v in V, T(v) is an element in W, so we can consider the coordinate vector for T(v) with respect to C. Explain why

(38.1)[T(v)]C=c1[T(v1)]C+c2[T(v2)]C++cn[T(vn)]C.
(c)

Now find a matrix A so that Equation (38.1) has the form [T(v)]C=A[v]B. We call the matrix A to be the matrix for T relative to the bases B and C and denote this matrix as [T]BC so that

[T(v)]C=[T]BC[v]B.

Activity 38.3 shows us how to represent a linear transformation as a matrix transformation.

Definition 38.2.

Let T be a linear transformation from a vector space V with basis B={v1, v2, , vn} to a vector space W with basis C={w1,w2,,wm}. The matrix for T with respect to the bases B and C is the matrix

[T]BC=[[T(v1)]C [T(v2)]C [T(v3)]C  [T(vn)]C].

If V=W and C=B, then we use the notation [T]B as a shorthand for [T]BC. The matrix [T]BC has the property that

[T(v)]C=A[v]B

for any v in V. Recall that we can find the unique vector in W whose coordinate vector is [T(v)]C, so we have completely realized the transformation T as a matrix transformation. In essence, we are viewing T as a composite of linear transformations, first from V to Rn, then from Rn to Rm, then from Rm to W as illustrated in Figure 38.3.

Figure 38.3. Visualizing the matrix of a linear transformation.

Activity 38.4.

Let T:P2P1 be defined by T(p(t))=p(t). Let B={1+t,1t,t+t2} be a basis for P2 and C={1,t} be a basis for P1.

(a)

Find the matrix [T]BC.

(b)

Find [1+t+t2]B. Then use the matrix [T]BC to calculate [T(1+t+t2)]C. (Hint: Use the fact that 1+t+t2=12(1+t)+12(1t)+(t+t2).)

(c)

Calculate T(1+t+t2) directly from the definition of T and compare to your result from part (b).

(d)

Find the matrix [T]BC where C={1+t,1t}. Use the facts that

1=12(1+t)12(1t)  and  1+2t=32(1+t)12(1t).

Subsection A Connection between Ker(T) and a Matrix Representation of T

Recall that we defined the kernel of a matrix transformation T:RnRm to be the set of vectors that T maps to the zero vector. If T is the matrix transformation defined by T(x)=Ax, we also saw that the kernel of T is the same as the null space of A. We can make a similar connection between a linear transformation and a matrix that defines the transformation.

Activity 38.5.

Let T:VW be a linear transformation from an n-dimensional vector space V to an m-dimensional vector space W with additive identity 0W. Let B be a basis for V and C a basis for W. Let A=[T]BC. Let T be the matrix transformation from Rn to Rm defined by T(x)=Ax.

(a)

Show that if v is in Ker(T), then [v]B is in Nul A.

Hint.

Apply an appropriate coordinate transformation.

(b)

Let B={v1,v2,,vn} and C={w1,w2,,wm}. Show that if the vector x=[x1 x2  xn] is in Nul A, then the vector v=x1v1+x2v2+xnvn is in Ker(T).

Hint.

Note that [v]B=x.

Activity 38.5 shows that if T:VW is a linear transformation from an n-dimensional vector space V with basis B to an m-dimensional vector space W with basis C, then there is a one-to-one correspondence between vectors in Ker(T) and vectors in Nul [T]BC. Recall that T is one-to-one if and only if Ker(T)={0V}, where 0V is the additive identity of V. So T will be one-to-one if and only if Nul [T]BC={0}. In other words, T is one-to-one if and only if every column of Nul [T]BC is a pivot column. Note that this does not depend on the basis B and C.

A similar argument shows that T is onto if and only if every row of [T]BC contains a pivot. This is left to the exercises (see Exercise 7).

Subsection Examples

What follows are worked examples that use the concepts from this section.

Example 38.4.

Let T:P1P2 be defined by T(a+bt)=b+at+2at2.

(a)

Show that T is a linear transformation.

Solution.

Let p(t)=a+bt and q(t)=c+dt be in P1. Then

T(p(t)+q(t))=T((a+c)+(b+d)t)=(b+d)+(a+c)t+2(a+c)t2=(b+at+2at2)+(d+ct+2ct2)=T(p(t))+T(q(t)).

Now let k be a scalar. Then

T(kp(t))=T((ka)+(kb)t)=(kb)+(ka)t+(2ka)t2=k(b+at+2at2)=kT(p(t)).

We conclude that T is a linear transformation.

(b)

Let S1={1,t} and S2={1,t,t2} be the standard bases for P1 and P2, respectively. Find the matrix [T]S2S1 for T with respect to S2 and S1. Use the matrix [T]S2S1 to determine if T is one-to-one and/or onto. Explain your reasoning. Use technology as appropriate.

Solution.

Recall that

[T]S1S2=[[T(1)]S2 [T(t)]S2]=[[t+2t2]S2 [1]S2]=[011020].

The linear transformation T is one-to-one and/or onto if and only if the matrix transformation defined by [T]S1S2 is one-to-one and/or onto. The reduced row echelon form of [T]S1S2 is [100100]. Since [T]S1S2 has a pivot in every column, T is one-to-one. However, [T]S1S2 does not have a pivot in every row, so T is not onto.

(c)

Use the matrix [T]S2S1 to find Ker(T) and Range(T). If possible, find a basis for each.

Solution.

From part (b) we know that T is one-to-one, so Ker(T)={0}. Let q(t) be a polynomial in Range(T). Then there is a polynomial p(t) in P1 such that T(p(t))=q(t). It follows that

[q(t)]S2=[T(p(t))]S2=[T]S1S2[p(t)]S1.

If p(t)=a0+a1t, then

S2=[011020][a0a1]=[a1a02a0]=a0[012]+a1[100].

Thus, q(t) is in the span of t+2t2 and 1. So Range(T)=Span{1,t+2t2}. Since neither 1 nor t+2t2 is a scalar multiple of the other, the vectors 1 and t+2t2 are linearly independent. Thus, {1,t+2t2} is a basis for Range(T).

(d)

Let B={1+t,1t} be a basis for P1 and C={t,1t2,t+t2} a basis for P2. Find the matrix [T]BC for T with respect to C and B.

Solution.

Recall that

[T]BC=[[T(1+t)]C [T(1t)]C]=[[1+2t+t2]C [1t2]C]=[001120].
(e)

Find T(12t) using the matrix [T]BC.

Solution.

To find T(12t) using the matrix [T]BC, recall that [T(p(t))]C=[T]BC[p(t)]B. First note that [12t]B=[1232]. So

[T(p(t))]C=[T]BC[p(t)]B=[100100][1232]=[011].

This makes

T(12t)=0(t)+(1)(1t2)+(1)(t+t2)=1t2t2.

To check, using the definition of T we have

T(12t)=t(12t)+(12t)=1t2t2.

Example 38.5.

Let T:VW be a linear transformation. Let B={v1,v2,,vn} be a basis for V and C={w1,w2,,wm} a basis for W. Let S:RnRm be the matrix transformation defined by S(x)=[T]BCx.

(a)

Let w be a vector in Range(T). Show that [w]C is in Col  [T]BC.

Solution.

Let w be a vector in Range(T). Then there exists a vector v in V such that T(v)=w. It follows that

[w]C=[T(v)]C=[T]BC[v]C.

Recall that the vectors of the form Az all linear combinations of the columns of A with weights from z, so [T]BC[v]C (or [w]C) is in Col  [T]BC.

(b)

If wRange(T), part (a) shows that [w]C is in Col  [T]BC. So the coordinate transformation [ ]C maps Range(T) into Col  [T]BC. Define R:Range(T)Col  [T]BC to be this coordinate transformation. That is, R(w)=[w]C. (As a coordinate transformation, R is a linear transformation.) We know that coordinate transformations are one-to-one. Show that R is also an onto transformation.

Solution.

Let R:Range(T)Col  [T]BC be the coordinate transformation R(w)=[w]C for each wRange(T). To show that R is an onto transformation, let y be in Col [T]BC. Then there exists x=[x1 x2  xn]T in Rn such that [T]BCx=y. Let v=x1v1+x2v2++xnvn. Then v is in V and [v]B=x. Also,

[T(v)]C=[T]BC[v]B=[T]BCx=y.

So if we let w=T(v) in Range(T), then [w]C=y and y and R is onto.

(c)

What can we conclude about the relationship between the vector spaces Range(T) and Col  [T]BC? What must then be true about dim(Range(T)) and dim(Col  [T]BC)?

Solution.

Since R is a one-to-one and onto linear transformation from Range(T) to Col  [T]BC, it follows that Range(T) and Col  [T]BC are isomorphic vector spaces, and therefore we also have dim(Range(T))=dim(Col  [T]BC).

When we connect the results of this example with the result of Exercise 5 in this section, we obtain a linear transformation analog of the Rank-Nullity Theorem. That is, if T is a linear transformation from a vector space V of dimension n with basis B to a vector space W of dimension m with basis C, then

dim(Ker(T))+dim(Range(T))=dim(Nul  [T]BC)+dim(Col  [T]BC)=n.

Subsection Summary

  • The standard matrix for a linear transformation T from Rn to Rm is the matrix

    A=[T(e1) T(e2)  T(en)],

    where {e1,e2,,en} is the standard basis for Rn. Then T is the matrix transformation defined by T(x)=Ax for all x in Rn.

  • Let V be an n dimensional vector space and W an m dimensional vector space and suppose T:VW is a linear transformation. Let B={v1,v2,,vn} be a basis for V and C={w1,w2,,wm} a basis for W. The matrix for T with respect to the bases B and C is the matrix

    [T]BC=[[T(v1)]C [T(v2)]C [T(v3)]C  [T(vn)]C].

    If V=W and C=B, then we use the notation [T]B as a shorthand for [T]BC. The matrix [T]BC has the property that

    [T(v)]C=[T]BC[v]B

    for any v in V.

  • The matrix for a linear transformation allows us to represent any linear transformation between finite dimensional vectors spaces as a matrix transformation. When we view a linear transformation T as a matrix transformation, we are able to use the matrix tools we have developed to understand T.

Exercises Exercises

1.

Let T:P2P3 be defined by T(a0+a1t+a2t2)=(a0+a1)+(a1+a2)t+a0t2+a2t3. You may assume that T is a linear transformation. Let B={p0(t),p1(t),p2(t)}, where p0(t)=1, p1(t)=t, and p2(t)=t2, be the standard basis for P2 and C={q0(t),q1(t),q2(t),q3(t)}, where q0(t)=1, q1(t)=t, q2(t)=t2, and q3(t)=t3, the standard basis for P3.

(a)

Write the polynomial r(t)=r0+r1t+r2t2 as a linear combination c0p0(t)+c1p1(t)+c2p2(t) of the basis vectors in B. Identify the weights c0, c1, and c2. What is [r(t)]B?

(b)

Without doing any calculations, explain why

T(r(t))=c0T(p0(t))+c1T(p1(t))+c2T(p2(t)).
(c)

Without doing any calculations, explain why

[T(r(t))]C=c0[T(p0(t))]C+c1[T(p1(t))]C+c2[T(p2(t))]C.
(d)

Explicitly determine [T(p0(t))]C, [T(p1(t))]C, [T(p2(t))]C.

(e)

Combine the results of parts (c) and (d) to find a matrix A so that

[T(r(t))]C=A[r(t)]B.
(f)

Use the matrix A to find [T(1+tt2)]C. Then use this vector to calculate T(1+tt2).

(g)

Calculate T(1+tt2) directly from the rule for T and compare to the previous result.

2.

Let V and W be finite dimensional vector spaces, and let S and T be linear transformations from V to W.

(a)

The sum S+T is defined as

(S+T)(x)=S(x)+T(x)

for all x in V. Let B be a basis for V and C a basis for W. Is the statement

[S+T]BC=[S]BC+[T]BC

true or false? If true, prove the statement. If false, provide a counterexample.

(b)

The scalar multiple cT, for a scalar c, is defined as

(cT)(x)=cT(x)

for all x in V. Let B be a basis for V and C a basis for W. Is the statement

[cT]BC=c[T]BC

true or false? If true, prove the statement. If false, provide a counterexample.

3.

If V, W, and U are finite dimensional vector spaces and S:VW and T:WU are linear transformations, the composite TS is defined as

(TS)(x)=T(S(x))

for all x in V.

(a)

Prove that TS:VU is a linear transformation.

Hint.

Use the linearity of both S and T.

(b)

Let B be a basis for V, C a basis for W, and D a basis for U. Is the statement

[TS]BD=[T]CD[S]BC

true or false? If true, prove the statement. If false, provide a counterexample.

4.

Let V be a finite dimensional vector space with basis B, and let T be a one-to-one linear transformation from V to V.

(a)

Use the matrix [T]B to explain why T is also onto. (Recall that we use the shorthand notation [T]B for [T]BB.)

(b)

Since T is one-to-one and onto, as a function T has an inverse defined by

T1(y)=x

whenever T(x)=y. Show that T1 is a linear transformation from V to V.

(c)

Is the statement

[T1]B=([T]B)1

true or false? If true, prove the statement. If false, provide a counterexample.

5.

Let V and W be vector spaces with dim(V)=n and dim(W)=m, and let T:VW. Let B be a basis for V and C a basis for W. There is a connection between Ker(T) and Nul [T]BC. Find the connection and verify it.

6.

Let V and W be vector spaces and define L(V,W) to be the set of all linear transformations from V to W as in Exercise 14 of Section 37. The set L(V,W) is a vector space with the operations as as follows for S and T are in L(V,W) and c a scalar:

(S+T)(v)=S(v)+T(v)   and   (cT)(v)=cT(v)

for all v in V. If dim(V)=n and dim(W)=m, find the dimension of L(V,W). (Hint: Let B be a basis for V and C a basis for W. What can be said about the mapping that sends T in L(V,W) to [T]BC? Then use Exercise 7 in Section 37.)

7.

Let T:VW be a linear transformation from an n-dimensional vector space V to an m-dimensional vector space W. Let B be a basis for V and C a basis for W. Let A=[T]BC. Let T be the matrix transformation from Rn to Rm defined by T(x)=Ax.

(a)

Show that if w is in Range(T), then [w]C is in the range of T.

(b)

Let B={v1,v2,,vn} and C={w1,w2,,wm}. Show that if the vector y=[y1 y2  ym] is in the range of T, then the vector w=y1w1+y2w2+ymwm is in the range of T.

(c)

Explain why the results of (a) and (b) show that T is onto if and only if every row of A=[T]BC contains a pivot.

Hint.

How do we tell if T is onto?

8.

Our entire world is always in a state of motion. Much of this motion is vibration. When the vibrations of one object some into contact with the vibrations of another, the vibrations can be amplified. This is called resonance. Resonance appears in our lives every day, e.g., resonance is how food cooks in a microwave oven. A great example of resonance is the collapse of the Tacoma Narrows Bridge (just Google Tacoma Narrows Bridge to find some fascinating videos of this event). Resonance can be seen in mathematical models of vibrations. One such model is the second order differential equation

y+y=cos(t),

where y is some unknown function of t and y is its second derivative. You can think of this system as modeling the oscillatory motion of a spring with mass attached to it. The cosine function in this example exerts an external force on the mass-spring system. (You don't need to know how this model is derived for this project.) Our goal is to find the solutions to this differential equation within the subspace Y=Span B, where B={cos(t),sin(t),tcos(t),tsin(t)} of D2, the subspace of F of functions with second derivatives (you may assume that D2 is a subspace of F). Let T:D2D2 be defined by T(f)=f+f.

(a)

Show that T is a linear transformation.

(b)

Show that B is a basis for Y.

Hint.

You might consider using the Wronskian.

(c)

Find the matrix of T with respect to the basis B. That is, find [T]B. (Recall that we use the shorthand notation [T]B for [T]BB.)

(d)

Use the matrix to find all solutions to the equation T(f)=cos(t) in Y.

Hint.

If T(f)=cos(t), what does that say about the relationship between [T]BB, [cos(t)]B, and [f]B?

(e)

Sketch a few graphs of solutions to T(f)=cos(t) and explain what they look like and how they are related to resonance.

9.

Label each of the following statements as True or False. Provide justification for your response.

(a) True/False.

If T is a linear transformation from a vector space V to a vector space W, and [T]BC is a 3×2 matrix for some bases B of V and C of W, then T cannot be one-to-one.

(b) True/False.

If T is a linear transformation from a vector space V to a vector space W, and [T]BC is a 2×3 matrix for some bases B of V and C of W, then T cannot be onto.

(c) True/False.

If T is a linear transformation from a vector space V to a vector space W, and [T]BC is a 2×3 matrix for some bases B of V and C of W, then T cannot be one-to-one.

(d) True/False.

If T is a linear transformation from a vector space V to a vector space W, and [T]BC is a 3×2 matrix for some bases B of V and C of W, then T cannot be onto.

(e) True/False.

Let S be a linear transformation from a vector space Y to a vector space V and let T be a linear transformation from a vector space V to a vector space W. Suppose that [S]SB is a 3×4 matrix and [T]BC is a 4×2 matrix for some bases S of Y, B of V and C of W. Then [TS]SC is a 3×2 matrix.

(f) True/False.

Let V be a finite dimensional vector space of dimension n with basis B and W a finite dimensional vector space of dimension m with basis C. Let T be a linear transformation from V to W. If the columns of the matrix [T]BC are linearly independent, then the transformation T is onto.

(g) True/False.

Let V be a finite dimensional vector space of dimension n with basis B and W a finite dimensional vector space of dimension m with basis C. Let T be a linear transformation from V to W. If the columns of the matrix [T]BC are linearly independent, then the transformation T is one-to-one.

(h) True/False.

Let V be a finite dimensional vector space of dimension n with basis B and W a finite dimensional vector space of dimension m with basis C. Let T be a linear transformation from V to W. If the matrix [T]BC has n pivots, then the transformation T is onto.

(i) True/False.

Let V be a finite dimensional vector space of dimension n with basis B and W a finite dimensional vector space of dimension m with basis C. Let T be a linear transformation from V to W. If the matrix [T]BC has n pivots, then the transformation T is one-to-one.

Subsection Project: Shamir's Secret Sharing and Lagrange Polynomials

Shamir's Secret Sharing is a secret sharing algorithm developed by the Israeli cryptographer Adi Shamir, who also contributed to the invention of RSA algorithm. The idea is to develop shares related to a secret code that can be distributed in such a way that the secret code can only be discovered if a fixed number of shareholders combine their information.

The general algorithm for Shamir's Secret Sharing works by creating a polynomial with the secret code as one coefficient and random remaining coefficients. More specifically, to create a (k,n) threshold scheme, let a0 be the secret code. Then choose at random k1 positive integers a1, a2, , ak1 and create the polynomial

p(t)=a0+a1t+a2t2++ak1tk1,

where a0 is the secret. Evaluate p(t) at n different inputs t1, t2, , tn to create n points P1=(t1,p(t1)), P2=(t2,p(t2)), , Pn=(tn,p(tn)). Each participant is given one of these points. Since any collection of k distinct points on the graph of p(t) uniquely determines p(t), any combination of k of the participants could reconstruct p(t). The secret is then p(0). (Note that, except under very restrictive circumstances, there is no polynomial of degree less than k that passes through the given k points, so it would be impossible for fewer than k participants to reconstruct the message.)

As an example, let our secret code be a0=1234. Let n=6 and k=3. Choose two positive integers at random, say a1=100 and a2=38. Then

(38.2)p(t)=1234+100t+38t2.

Now we construct 6 points by selecting 6 positive integers, say t1=1, t2=2, t3=3, t4=4, t5=5, and t6=6. Evaluating p(t) at t=1 through t=6 gives us the points P1=(1,1372), P2=(2,1586), P3=(3,1876), P4=(4,2242), P5=(5,2684), and P6=(6,3202). Our goal is to find the polynomial that passes through any three of these points. The next activity will show us how to find this polynomial.

Project Activity 38.6.

It will be instructive to work in the most general setting. We restrict ourselves to the degree 2 case for now. Given three scalars t1, t2, and t3, define L:P2R3 by

L(q(t))=[q(t1)q(t2)q(t3)].
(a)

Show that L is a linear transformation.

(b)

Find the matrix for L with respect to the standard bases B={e1,e2,e3} for R3 and S={1,t,t2} for P2.

(c)

Recall that the matrix [L]SB has the property that [L(q(t))]B=[L]SB[q(t)]S for any q(t) in P2. So L is one-to-one if and only if the matrix transformation defined by [L]SB is one-to-one. Use this idea to show that L is one-to-one if and only if t1, t2, and t3 are all different. Use appropriate technology where needed.

(d)

Given three points (t1,y1), (t2,y2), and (t3,y3) with distinct t1, t2, and t3, our objective is to find a polynomial p(t) such that p(ti)=yi for i from 1 to 3. We proceed by finding quadratic polynomials 1(t), 2(t), and 3(t) so that L(1(t))=e1, L(2(t))=e2, and L(3(t))=e3. Explain why, if 1(t), 2(t), and 3(t) are quadratic polynomials so that L(1(1))=e1, L(2(t))=e2, and L(3(t))=e3, and t1, t2, and t3 are all different, then the polynomial p(t) will satisfy

(38.3)p(t)=y11(t)+y22(t)+y33(t).

The polynomials 1(t), 2(t), and 3(t) in Project Activity 38.6 are examples of Lagrange polynomials. Project Activity 38.6 shows that fitting polynomials to given points can be accomplished easily using linear combinations of Lagrange polynomials. Now we want to better understand the general formulas for the Lagrange polynomials i(t).

Project Activity 38.7.

In this activity we see how to find the quadratic polynomials 1(t), 2(t), and 3(t) so that L(1(t))=e1, L(2(t))=e2, and L(3(t))=e3. Let B={e1,e2,e3} and S={1,t,t2} be the standard bases for R3 and P2, respectively.

(a)

Explain why the problem of solving the equations L(1(t))=e1, L(2(t))=e2, and L(3(t))=e3 is equivalent to solving the equations

[L]SB[1(t)]S=e1, [L]SB[2(t)]S=e2,  and  [L]SB[3(t)]S=e3.
(b)

Explain why we can solve the equations

[L]SB[1(t)]S=e1, [L]SB[2(t)]S=e2,  and  [L]SB[3(t)]S=e3

all at once by solving the matrix equation

[L]SB[[1(t)]S [2(t)]S [3(t)]S]=I3.

What does this tell us about the relationship between the matrix [[1(t)]S [2(t)]S [3(t)]S] and [L]SB?

(c)

Technology shows that

([L]SB)1=[t2t3(t1t2)(t1t3)t1t3(t2t1)(t2t3)t1t2(t3t1)(t3t2)t2+t3(t1t2)(t1t3)t1+t3(t2t1)(t2t3)t1+t2(t3t1)(t3t2)1(t1t2)(t1t3)1(t2t1)(t2t3)1(t3t1)(t3t2)].

Use ([L]SB)1 to determine the coefficients of 1(t). Then apply some algebra to show that

1(t)=(tt2)(tt3)(t1t2)(t1t3).
(d)

Find similar expressions for 2(t) and 3(t). Explain why these three polynomials satisfy the required conditions that L(1(t))=e1, L(2(t))=e2, and L(3(t))=e3.

Now we return to our secret code with a0=1234.

Project Activity 38.8.

Pick any three of the points P1=(1,1372), P2=(2,1586), P3=(3,1876), P4=(4,2242), P5=(5,2684), and P6=(6,3202). Use the Lagrange polynomials 1(t), 2(t), and 3(t) and (38.3) to find the polynomial whose graph contains the three chosen points. How does your polynomial compare to the polynomial p(t) in (38.2)?

The Shamir Secret Sharing algorithm depends on being able to find a unique polynomial p(t) that passes through the created points. We can understand this result with Lagrange polynomials.

Project Activity 38.9.

The process described in Project Activity 38.7 for finding the Lagrange polynomials can be applied to any number of points. Let (t1,y1), (t2,y2), (t3,y3), , (tn,yn), and (tn+1,yn+1) be n+1 points with distinct ti. Generalizing the results of Project Activity 38.7, define i(t) for i from 1 to n+1 as follows:

i(t)=(tt1)(tt2)(tti1)(tti+1)(ttn)(ttn+1)(tit1)(tit2)(titi1)(titi+1)(titn)(titn+1)=jittjtitj.
(a)

Explain why i(t) is in Pn for each i.

(b)

Explain why the polynomial i(t) satisfies i(ti)=1 and i(tj)=0 if ij.

(c)

Let p(t)=i=1n+1yii(t). That is, p(t) is the polynomial

i=1n+1yi(tt1)(tt2)(tti1)(tti+1)(ttn)(ttn+1)(tit1)(tit2)(titi1)(titi+1)(titn)(titn+1).

Explain why p(t) is a polynomial in Pn whose graph contains the points (ti,yi) for i from 1 to n+1.

(d)

The previous part demonstrates that there is always a polynomial in Pn whose graph contains the points (t1,y1), (t2,y2), (t3,y3), , (tn,yn), and (tn+1,yn+1) with distinct ti. The last piece we need is to know that this polynomial is unique. Use the fact that a polynomial of degree n can have at most n roots to show that if f(t) and g(t) are two polynomials in Pn whose graphs contain the points (t1,y1), (t2,y2), , (tn,yn), (tn+1,yn+1) with distinct values of ti, then f(t)=g(t). This completes Shamir's Secret Sharing algorithm.