
default search action
James Bartusek
2020 – today
- 2024
- [c26]James Bartusek, Justin Raizes:
Secret Sharing with Certified Deletion. CRYPTO (7) 2024: 184-214 - [c25]James Bartusek, Vipul Goyal, Dakshita Khurana
, Giulio Malavolta
, Justin Raizes, Bhaskar Roberts:
Software with Certified Deletion. EUROCRYPT (4) 2024: 85-111 - [c24]James Bartusek
, Thiago Bergamaschi
, Seri Khoury
, Saachi Mutreja
, Orr Paradise
:
On the Communication Complexity of Secure Multi-Party Computation With Aborts. PODC 2024: 480-491 - [c23]James Bartusek
, Zvika Brakerski
, Vinod Vaikuntanathan
:
Quantum State Obfuscation from Classical Oracles. STOC 2024: 1009-1017 - [i41]James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan:
Quantum State Obfuscation from Classical Oracles. CoRR abs/2401.10200 (2024) - [i40]James Bartusek, Justin Raizes:
Secret Sharing with Certified Deletion. CoRR abs/2405.08117 (2024) - [i39]James Bartusek, Thiago Bergamaschi, Seri Khoury, Saachi Mutreja, Orr Paradise:
On the Communication Complexity of Secure Multi-Party Computation With Aborts. CoRR abs/2406.06914 (2024) - [i38]James Bartusek, Dakshita Khurana:
On the Power of Oblivious State Preparation. CoRR abs/2411.04234 (2024) - [i37]James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan:
Quantum State Obfuscation from Classical Oracles. IACR Cryptol. ePrint Arch. 2024: 82 (2024) - [i36]James Bartusek, Justin Raizes:
Secret Sharing with Certified Deletion. IACR Cryptol. ePrint Arch. 2024: 736 (2024) - [i35]James Bartusek, Dakshita Khurana:
On the Power of Oblivious State Preparation. IACR Cryptol. ePrint Arch. 2024: 1820 (2024) - 2023
- [c22]James Bartusek
, Dakshita Khurana
, Alexander Poremba:
Publicly-Verifiable Deletion via Target-Collapsing Functions. CRYPTO (5) 2023: 99-128 - [c21]James Bartusek
, Dakshita Khurana
:
Cryptography with Certified Deletion. CRYPTO (5) 2023: 192-223 - [c20]James Bartusek
, Dakshita Khurana
, Akshayaram Srinivasan:
Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge). CRYPTO (5) 2023: 224-257 - [c19]James Bartusek
, Sanjam Garg, Abhishek Jain
, Guru-Vamsi Policharla:
End-to-End Secure Messaging with Traceability Only for Illegal Content. EUROCRYPT (5) 2023: 35-66 - [c18]Amit Agarwal, James Bartusek
, Dakshita Khurana
, Nishant Kumar:
A New Framework for Quantum Oblivious Transfer. EUROCRYPT (1) 2023: 363-394 - [c17]James Bartusek
, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Obfuscation of Pseudo-Deterministic Quantum Circuits. STOC 2023: 1567-1578 - [c16]James Bartusek, Dakshita Khurana
, Giulio Malavolta
, Alexander Poremba, Michael Walter:
Weakening Assumptions for Publicly-Verifiable Deletion. TCC (4) 2023: 183-197 - [i34]James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Obfuscation of Pseudo-Deterministic Quantum Circuits. CoRR abs/2302.11083 (2023) - [i33]James Bartusek, Dakshita Khurana
, Alexander Poremba:
Publicly-Verifiable Deletion via Target-Collapsing Functions. CoRR abs/2303.08676 (2023) - [i32]James Bartusek, Dakshita Khurana
, Giulio Malavolta
, Alexander Poremba, Michael Walter:
Weakening Assumptions for Publicly-Verifiable Deletion. CoRR abs/2304.09846 (2023) - [i31]James Bartusek, Dakshita Khurana
, Akshayaram Srinivasan:
Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge). CoRR abs/2304.10480 (2023) - [i30]James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Obfuscation of Pseudo-Deterministic Quantum Circuits. IACR Cryptol. ePrint Arch. 2023: 252 (2023) - [i29]James Bartusek, Sanjam Garg
, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, Bhaskar Roberts:
Obfuscation and Outsourced Computation with Certified Deletion. IACR Cryptol. ePrint Arch. 2023: 265 (2023) - [i28]James Bartusek, Dakshita Khurana, Alexander Poremba:
Publicly-Verifiable Deletion via Target-Collapsing Functions. IACR Cryptol. ePrint Arch. 2023: 370 (2023) - [i27]James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, Michael Walter:
Weakening Assumptions for Publicly-Verifiable Deletion. IACR Cryptol. ePrint Arch. 2023: 559 (2023) - [i26]James Bartusek, Dakshita Khurana, Akshayaram Srinivasan:
Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge). IACR Cryptol. ePrint Arch. 2023: 564 (2023) - 2022
- [c15]James Bartusek
, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta
, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang:
Succinct Classical Verification of Quantum Computation. CRYPTO (2) 2022: 195-211 - [c14]James Bartusek
, Giulio Malavolta
:
Indistinguishability Obfuscation of Null Quantum Circuits and Applications. ITCS 2022: 15:1-15:13 - [c13]James Bartusek
, Sanjam Garg, Akshayaram Srinivasan, Yinuo Zhang:
Reusable Two-Round MPC from LPN. Public Key Cryptography (1) 2022: 165-193 - [i25]James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta
, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang:
Succinct Classical Verification of Quantum Computation. CoRR abs/2206.14929 (2022) - [i24]James Bartusek, Dakshita Khurana
:
Cryptography with Certified Deletion. CoRR abs/2207.01754 (2022) - [i23]Amit Agarwal, James Bartusek, Dakshita Khurana
, Nishant Kumar:
A New Framework for Quantum Oblivious Transfer. CoRR abs/2209.04520 (2022) - [i22]James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang:
Succinct Classical Verification of Quantum Computation. IACR Cryptol. ePrint Arch. 2022: 857 (2022) - [i21]James Bartusek, Dakshita Khurana:
Cryptography with Certified Deletion. IACR Cryptol. ePrint Arch. 2022: 1178 (2022) - [i20]Amit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar:
A New Framework for Quantum Oblivious Transfer. IACR Cryptol. ePrint Arch. 2022: 1191 (2022) - [i19]James Bartusek, Sanjam Garg
, Abhishek Jain, Guru-Vamsi Policharla:
End-to-End Secure Messaging with Traceability Only for Illegal Content. IACR Cryptol. ePrint Arch. 2022: 1643 (2022) - 2021
- [c12]James Bartusek
, Andrea Coladangelo
, Dakshita Khurana
, Fermi Ma:
On the Round Complexity of Secure Quantum Computation. CRYPTO (1) 2021: 406-435 - [c11]James Bartusek
, Andrea Coladangelo
, Dakshita Khurana
, Fermi Ma:
One-Way Functions Imply Secure Computation in a Quantum World. CRYPTO (1) 2021: 467-496 - [c10]Amit Agarwal, James Bartusek
, Vipul Goyal, Dakshita Khurana
, Giulio Malavolta
:
Post-Quantum Multi-Party Computation. EUROCRYPT (1) 2021: 435-464 - [c9]James Bartusek
:
Secure Quantum Computation with Classical Communication. TCC (1) 2021: 1-30 - [c8]Amit Agarwal, James Bartusek
, Vipul Goyal, Dakshita Khurana
, Giulio Malavolta
:
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation. TCC (1) 2021: 654-685 - [i18]James Bartusek, Giulio Malavolta:
Indistinguishability Obfuscation of Null Quantum Circuits and Applications. CoRR abs/2106.06094 (2021) - [i17]James Bartusek, Sanjam Garg
, Akshayaram Srinivasan, Yinuo Zhang:
Reusable Two-Round MPC from LPN. IACR Cryptol. ePrint Arch. 2021: 316 (2021) - [i16]James Bartusek, Giulio Malavolta:
Candidate Obfuscation of Null Quantum Circuits and Witness Encryption for QMA. IACR Cryptol. ePrint Arch. 2021: 421 (2021) - [i15]James Bartusek:
Secure Quantum Computation with Classical Communication. IACR Cryptol. ePrint Arch. 2021: 964 (2021) - [i14]Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation. IACR Cryptol. ePrint Arch. 2021: 1230 (2021) - 2020
- [c7]James Bartusek
, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. ITCS 2020: 82:1-82:39 - [c6]James Bartusek
, Sanjam Garg, Daniel Masny, Pratyay Mukherjee:
Reusable Two-Round MPC from DDH. TCC (2) 2020: 320-348 - [i13]Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Post-Quantum Multi-Party Computation in Constant Rounds. CoRR abs/2005.12904 (2020) - [i12]James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma:
On The Round Complexity of Two-Party Quantum Computation. CoRR abs/2011.11212 (2020) - [i11]James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma:
One-Way Functions Imply Secure Computation in a Quantum World. CoRR abs/2011.13486 (2020) - [i10]Saikrishna Badrinarayanan, James Bartusek, Sanjam Garg
, Daniel Masny, Pratyay Mukherjee:
Reusable Two-Round MPC from DDH. IACR Cryptol. ePrint Arch. 2020: 170 (2020) - [i9]James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. IACR Cryptol. ePrint Arch. 2020: 889 (2020) - [i8]Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Post-Quantum Multi-Party Computation. IACR Cryptol. ePrint Arch. 2020: 1395 (2020) - [i7]James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma:
On The Round Complexity of Two-Party Quantum Computation. IACR Cryptol. ePrint Arch. 2020: 1471 (2020) - [i6]James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma:
One-Way Functions Imply Secure Computation in a Quantum World. IACR Cryptol. ePrint Arch. 2020: 1487 (2020)
2010 – 2019
- 2019
- [c5]James Bartusek
, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). ASIACRYPT (3) 2019: 489-519 - [c4]James Bartusek
, Fermi Ma, Mark Zhandry
:
The Distinction Between Fixed and Random Generators in Group-Based Assumptions. CRYPTO (2) 2019: 801-830 - [c3]James Bartusek
, Tancrède Lepoint, Fermi Ma, Mark Zhandry
:
New Techniques for Obfuscating Conjunctions. EUROCRYPT (3) 2019: 636-666 - [c2]James Bartusek
, Liron Bronfman, Justin Holmgren, Fermi Ma, Ron D. Rothblum:
On the (In)security of Kilian-Based SNARGs. TCC (2) 2019: 522-551 - [i5]James Bartusek, Fermi Ma, Mark Zhandry:
The Distinction Between Fixed and Random Generators in Group-Based Assumptions. IACR Cryptol. ePrint Arch. 2019: 202 (2019) - [i4]James Bartusek, Brent Carmer, Abhishek Jain
, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). IACR Cryptol. ePrint Arch. 2019: 746 (2019) - [i3]James Bartusek, Liron Bronfman, Justin Holmgren
, Fermi Ma, Ron Rothblum:
On the (In)security of Kilian-Based SNARGs. IACR Cryptol. ePrint Arch. 2019: 997 (2019) - 2018
- [c1]James Bartusek
, Jiaxin Guan, Fermi Ma, Mark Zhandry
:
Return of GGH15: Provable Security Against Zeroizing Attacks. TCC (2) 2018: 544-574 - [i2]James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry:
Preventing Zeroizing Attacks on GGH15. IACR Cryptol. ePrint Arch. 2018: 511 (2018) - [i1]James Bartusek, Tancrède Lepoint, Fermi Ma, Mark Zhandry:
New Techniques for Obfuscating Conjunctions. IACR Cryptol. ePrint Arch. 2018: 936 (2018)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
