Follow
James Bartusek
James Bartusek
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
One-way functions imply secure computation in a quantum world
J Bartusek, A Coladangelo, D Khurana, F Ma
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
452021
Return of GGH15: provable security against zeroizing attacks
J Bartusek, J Guan, F Ma, M Zhandry
Theory of Cryptography Conference, 544-574, 2018
44*2018
New techniques for obfuscating conjunctions
J Bartusek, T Lepoint, F Ma, M Zhandry
Annual International Conference on the Theory and Applications of …, 2019
372019
The distinction between fixed and random generators in group-based assumptions
J Bartusek, F Ma, M Zhandry
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
292019
Post-Quantum Multi-Party Computation
A Agarwal, J Bartusek, V Goyal, D Khurana, G Malavolta
282020
Affine determinant programs: a framework for obfuscation and witness encryption
J Bartusek, Y Ishai, A Jain, F Ma, A Sahai, M Zhandry
11th Innovations in Theoretical Computer Science Conference (ITCS 2020), 2020
282020
On the round complexity of secure quantum computation
J Bartusek, A Coladangelo, D Khurana, F Ma
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
262021
Cryptography with certified deletion
J Bartusek, D Khurana
Annual International Cryptology Conference, 192-223, 2023
212023
Indistinguishability obfuscation of null quantum circuits and applications
J Bartusek, G Malavolta
arXiv preprint arXiv:2106.06094, 2021
19*2021
On the (in) security of Kilian-based SNARGs
J Bartusek, L Bronfman, J Holmgren, F Ma, RD Rothblum
Theory of Cryptography Conference, 522-551, 2019
182019
Reusable two-round MPC from DDH
J Bartusek, S Garg, D Masny, P Mukherjee
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
172020
Obfuscation and outsourced computation with certified deletion
J Bartusek, S Garg, V Goyal, D Khurana, G Malavolta, J Raizes, B Roberts
Cryptology ePrint Archive, 2023
112023
Secure quantum computation with classical communication
J Bartusek
Theory of Cryptography Conference, 1-30, 2021
112021
Succinct classical verification of quantum computation
J Bartusek, YT Kalai, A Lombardi, F Ma, G Malavolta, V Vaikuntanathan, ...
Annual International Cryptology Conference, 195-211, 2022
102022
Public-key function-private hidden vector encryption (and more)
J Bartusek, B Carmer, A Jain, Z Jin, T Lepoint, F Ma, T Malkin, ...
International Conference on the Theory and Application of Cryptology and …, 2019
102019
Reusable two-round MPC from LPN
J Bartusek, S Garg, A Srinivasan, Y Zhang
IACR International Conference on Public-Key Cryptography, 165-193, 2022
82022
Two-round maliciously secure computation with super-polynomial simulation
A Agarwal, J Bartusek, V Goyal, D Khurana, G Malavolta
Theory of Cryptography Conference, 654-685, 2021
82021
Publicly-verifiable deletion via target-collapsing functions
J Bartusek, D Khurana, A Poremba
Annual International Cryptology Conference, 99-128, 2023
72023
End-to-End Secure Messaging with Traceability Only for Illegal Content
J Bartusek, S Garg, A Jain, GV Policharla
Annual International Conference on the Theory and Applications of …, 2023
62023
Obfuscation of pseudo-deterministic quantum circuits
J Bartusek, F Kitagawa, R Nishimaki, T Yamakawa
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 1567-1578, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20