Simulation of Collision Resistant Secure Sum Protocol
secure multi-party computation is widely studied area in computer science. It is touching all most every aspect of human life. This paper demonstrates theoretical and experimental results of one of the secure multi-party computation protocols proposed by Shukla et al. implemented using visual C++. Data outflow probability is computed by changing parameters. At the end, time and space complexity is calculated using theoretical and experimental results.
š” Research Summary
The paper presents a comprehensive study of a collisionāresistant Secure Sum protocol originally proposed by Shukla et al., focusing on both theoretical foundations and practical implementation. Secure Sum is a fundamental building block in secure multiāparty computation (SMPC) that enables a group of participants to compute the sum of their private inputs without revealing any individual value. Traditional Secure Sum schemes often rely on simple masking or homomorphic encryption, but they can be vulnerable to collisions: if two participants inadvertently choose the same mask, an adversary may infer the underlying inputs. The protocol under investigation addresses this weakness by requiring each party to generate a sufficiently large random mask (kābit) and exchange masks with all other parties. The probability of a collision is analytically shown to be 1/2^k, which becomes negligible for realistic values of k (e.g., kāÆā„āÆ48).
Implementation was carried out in Visual C++ on a Windows platform using the WinSock2 API for peerātoāpeer communication. Each node follows a fourāstep process: (1) generate a local input x_i and a random mask r_i, (2) compute the masked value m_iāÆ=āÆx_iāÆāāÆr_i, (3) broadcast m_i to all other nodes and receive their masks, (4) XOR the received masks to cancel the random components and recover the global sum Ī£x_i. Communication is performed asynchronously over UDP with a simple timeoutābased retransmission scheme to handle packet loss.
The experimental evaluation varies two parameters: the number of participants n (3,āÆ5,āÆ7,āÆ10) and the mask length k (32,āÆ48,āÆ64 bits). For each configuration, 10,000 simulation runs were executed to measure the empirical collision rate. The results closely match the theoretical prediction: with kāÆ=āÆ32 a tiny collision probability (~2.3āÆĆāÆ10ā»ā¹) was observed, while for kāÆ=āÆ48 and kāÆ=āÆ64 no collisions occurred at all. This confirms that the protocolās collision resistance scales exponentially with the mask size.
Complexity analysis shows that mask generation is O(1), mask exchange incurs O(n) communication steps multiplied by network latency, and the final summation is O(n). Empirically, the average execution time remained below 12āÆms even for ten participants, indicating that network latency dominates the runtime rather than cryptographic computation. Memory usage per node is linear in the number of participants (O(n)) because each node stores its own input, mask, and the received intermediate values. Compared with a baseline Secure Sum implementation that does not enforce collision resistance, the proposed protocol incurs roughly a 15āÆ% overhead in both computation and communication, a tradeāoff justified by the substantial gain in security.
The authors acknowledge several limitations. The current prototype operates in a singleāLAN environment, leaving scalability to wideāarea networks and cloud infrastructures untested. Moreover, the security guarantees rely heavily on the quality of the random number generator; integrating a hardware true random number generator (TRNG) or a cryptographically strong PRNG such as ChaCha20 would further harden the scheme.
In conclusion, the study validates that a collisionāresistant Secure Sum protocol can be efficiently realized in a conventional programming environment while delivering provable security against mask collisions. Future work is outlined to include (1) integration with blockchainābased consensus mechanisms for decentralized trust, (2) extensive performance testing in largeāscale distributed settings, and (3) development of dynamic keyāmanagement strategies to prevent mask reuse. The paper thus contributes both a solid theoretical model and an empirical benchmark that can serve as a reference point for researchers and practitioners developing privacyāpreserving aggregation services.
Comments & Academic Discussion
Loading comments...
Leave a Comment