Claim Missing Document
Check
Articles

Found 2 Documents
Search

Integrating Fully Homomorphic Encryption and Zero-Knowledge Proofs for Efficient Verifiable Computation Qureshi, UmmeAmmara; Doshi, Bhumika; More, Aditya; Joshi, Kashyap; Kumar, Kapil
Journal of Computing Theories and Applications Vol. 3 No. 3 (2026): JCTA 3(3) 2026
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jcta.14181

Abstract

Fully Homomorphic Encryption (FHE) enables computation on encrypted data with end-to-end confidentiality; however, its practical adoption remains limited by substantial computational costs, including long encryption and decryption times, high memory consumption, and operational latency. Zero-Knowledge Proofs (ZKPs) complement FHE by enabling correctness verification without revealing sensitive information, although they do not support encrypted computation independently. This study integrates both techniques to enable encrypted computation with verifiably consistent results. A prototype system is implemented in Python using Microsoft SEAL for homomorphic encryption and PySNARK for Zero-Knowledge Proof verification. Experiments are conducted on standard consumer-grade hardware (Intel i5, 8 GB RAM, Ubuntu 22.04) using datasets ranging from 100 MB to 1 GB. The evaluation focuses on encryption and decryption time, homomorphic computation latency, memory usage, and proof generation overhead. Experimental results show that integrating ZKPs introduces a moderate and stable runtime overhead of approximately 15–20%, as analyzed in Section 4, while enabling verification without plaintext disclosure. Ciphertext expansion remains a notable limitation, with observed growth of approximately 30–40× relative to plaintext size, consistent with prior FHE implementations. Despite these overheads, the system demonstrates feasible scalability for datasets up to 1 GB on mid-level hardware. Overall, the results indicate that the integrated FHE+ZKP approach provides a practical balance between confidentiality, verifiability, and performance, supporting its applicability to privacy-preserving scenarios such as secure cloud computation, encrypted data analytics, and confidential data processing under realistic resource constraints.
Enhanced Techniques for Detecting Promiscuous Mode using Packet Fu and the Metasploit Framework Pandya, Partho; Joshi, Kashyap; Kumar, Kapil
International Journal of Education, Science, Technology, and Engineering (IJESTE) Vol 8 No 2: December 2025
Publisher : Lamintang Education and Training Centre, in collaboration with the International Association of Educators, Scientists, Technologists, and Engineers (IA-ESTE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36079/lamintang.ijeste-0802.880

Abstract

This article argues that Thailand’s public-sector digitalisation has so far failed to realise the principles of Digital Era Governance (DEG) because it remains institutionally and politically anchored in New Public Management (NPM) logic. Rather than enabling platform-based integration and citizen-centric services, digital initiatives have often reproduced audit-centric, siloed practices that prioritise measurable outputs and compliance. Using a policy-analytic approach, document review of national strategies and agency plans, and synthesis of recent literature and sectoral case examples; the article identifies three mechanisms by which NPM logic is perpetuated in Thailand’s digital transition: (1) proliferation of discrete applications driven by performance reporting and agency visibility; (2) digital tools as instruments of control and compliance rather than coordination; and (3) governance fragmentation and weak interoperability governance. The paper concludes with targeted policy recommendations to reorient Thailand’s digitalisation toward DEG: consolidate digital architecture around shared platforms and standards, redesign performance regimes to reward integration and outcomes, and strengthen cross-agency data governance.