James Bartusek

Orcid: 0009-0000-9020-3589

Affiliations:
  • New York University, USA


According to our database1, James Bartusek authored at least 35 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Laconic PSI on Authenticated Inputs and Applications.
IACR Cryptol. ePrint Arch., 2025

On the Power of Oblivious State Preparation.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Obfuscation of Quantum Computation
PhD thesis, 2024

Quantum State Obfuscation from Classical Oracles.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

On the Communication Complexity of Secure Multi-Party Computation With Aborts.
Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing, 2024

Software with Certified Deletion.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Secret Sharing with Certified Deletion.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Obfuscation and Outsourced Computation with Certified Deletion.
IACR Cryptol. ePrint Arch., 2023

Weakening Assumptions for Publicly-Verifiable Deletion.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Obfuscation of Pseudo-Deterministic Quantum Circuits.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

End-to-End Secure Messaging with Traceability Only for Illegal Content.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

A New Framework for Quantum Oblivious Transfer.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge).
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Publicly-Verifiable Deletion via Target-Collapsing Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Cryptography with Certified Deletion.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Reusable Two-Round MPC from LPN.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Indistinguishability Obfuscation of Null Quantum Circuits and Applications.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Succinct Classical Verification of Quantum Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Candidate Obfuscation of Null Quantum Circuits and Witness Encryption for QMA.
IACR Cryptol. ePrint Arch., 2021

Secure Quantum Computation with Classical Communication.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Post-Quantum Multi-Party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

One-Way Functions Imply Secure Computation in a Quantum World.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

On the Round Complexity of Secure Quantum Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
On The Round Complexity of Two-Party Quantum Computation.
IACR Cryptol. ePrint Arch., 2020

Reusable Two-Round MPC from DDH.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum Multi-Party Computation in Constant Rounds.
CoRR, 2020

Reusable Two-Round MPC from DDH.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

2019
On the (In)security of Kilian-Based SNARGs.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

New Techniques for Obfuscating Conjunctions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

The Distinction Between Fixed and Random Generators in Group-Based Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Public-Key Function-Private Hidden Vector Encryption (and More).
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Preventing Zeroizing Attacks on GGH15.
IACR Cryptol. ePrint Arch., 2018

Return of GGH15: Provable Security Against Zeroizing Attacks.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018


  Loading...