Volgen
James Bartusek
James Bartusek
Geverifieerd e-mailadres voor berkeley.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
One-way functions imply secure computation in a quantum world
J Bartusek, A Coladangelo, D Khurana, F Ma
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
502021
Return of GGH15: provable security against zeroizing attacks
J Bartusek, J Guan, F Ma, M Zhandry
Theory of Cryptography Conference, 544-574, 2018
46*2018
New techniques for obfuscating conjunctions
J Bartusek, T Lepoint, F Ma, M Zhandry
Annual International Conference on the Theory and Applications of …, 2019
402019
The distinction between fixed and random generators in group-based assumptions
J Bartusek, F Ma, M Zhandry
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
332019
Affine determinant programs: a framework for obfuscation and witness encryption
J Bartusek, Y Ishai, A Jain, F Ma, A Sahai, M Zhandry
11th Innovations in Theoretical Computer Science Conference (ITCS 2020), 2020
292020
On the round complexity of secure quantum computation
J Bartusek, A Coladangelo, D Khurana, F Ma
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
282021
Post-Quantum Multi-Party Computation
A Agarwal, J Bartusek, V Goyal, D Khurana, G Malavolta
282020
Cryptography with certified deletion
J Bartusek, D Khurana
Annual International Cryptology Conference, 192-223, 2023
242023
Indistinguishability obfuscation of null quantum circuits and applications
J Bartusek, G Malavolta
arXiv preprint arXiv:2106.06094, 2021
20*2021
On the (in) security of Kilian-based SNARGs
J Bartusek, L Bronfman, J Holmgren, F Ma, RD Rothblum
Theory of Cryptography Conference, 522-551, 2019
182019
Reusable two-round MPC from DDH
J Bartusek, S Garg, D Masny, P Mukherjee
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
172020
Secure quantum computation with classical communication
J Bartusek
Theory of Cryptography Conference, 1-30, 2021
142021
Obfuscation and outsourced computation with certified deletion
J Bartusek, S Garg, V Goyal, D Khurana, G Malavolta, J Raizes, B Roberts
Cryptology ePrint Archive, 2023
132023
Succinct classical verification of quantum computation
J Bartusek, YT Kalai, A Lombardi, F Ma, G Malavolta, V Vaikuntanathan, ...
Annual International Cryptology Conference, 195-211, 2022
112022
Public-key function-private hidden vector encryption (and more)
J Bartusek, B Carmer, A Jain, Z Jin, T Lepoint, F Ma, T Malkin, ...
International Conference on the Theory and Application of Cryptology and …, 2019
102019
Publicly-verifiable deletion via target-collapsing functions
J Bartusek, D Khurana, A Poremba
Annual International Cryptology Conference, 99-128, 2023
82023
End-to-End Secure Messaging with Traceability Only for Illegal Content
J Bartusek, S Garg, A Jain, GV Policharla
Annual International Conference on the Theory and Applications of …, 2023
82023
Reusable two-round MPC from LPN
J Bartusek, S Garg, A Srinivasan, Y Zhang
IACR International Conference on Public-Key Cryptography, 165-193, 2022
82022
Two-round maliciously secure computation with super-polynomial simulation
A Agarwal, J Bartusek, V Goyal, D Khurana, G Malavolta
Theory of Cryptography Conference, 654-685, 2021
82021
Obfuscation of pseudo-deterministic quantum circuits
J Bartusek, F Kitagawa, R Nishimaki, T Yamakawa
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 1567-1578, 2023
72023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20