Skip to main content

Showing 1–13 of 13 results for author: Bartusek, J

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2411.04234  [pdf, ps, other

    quant-ph cs.CR

    On the Power of Oblivious State Preparation

    Authors: James Bartusek, Dakshita Khurana

    Abstract: We put forth Oblivious State Preparation (OSP) as a cryptographic primitive that unifies techniques developed in the context of a quantum server interacting with a classical client. OSP allows a classical polynomial-time sender to input a choice of one out of two public observables, and a quantum polynomial-time receiver to recover an eigenstate of the corresponding observable -- while keeping the… ▽ More

    Submitted 6 November, 2024; originally announced November 2024.

  2. arXiv:2401.10200  [pdf, ps, other

    quant-ph cs.CR

    Quantum State Obfuscation from Classical Oracles

    Authors: James Bartusek, Zvika Brakerski, Vinod Vaikuntanathan

    Abstract: A major unresolved question in quantum cryptography is whether it is possible to obfuscate arbitrary quantum computation. Indeed, there is much yet to understand about the feasibility of quantum obfuscation even in the classical oracle model, where one is given for free the ability to obfuscate any classical circuit. In this work, we develop a new array of techniques that we use to construct a q… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  3. arXiv:2304.10480  [pdf, ps, other

    quant-ph cs.CR

    Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)

    Authors: James Bartusek, Dakshita Khurana, Akshayaram Srinivasan

    Abstract: Can a sender non-interactively transmit one of two strings to a receiver without knowing which string was received? Does there exist minimally-interactive secure multiparty computation that only makes (black-box) use of symmetric-key primitives? We provide affirmative answers to these questions in a model where parties have access to shared EPR pairs, thus demonstrating the cryptographic power of… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  4. arXiv:2304.09846  [pdf, ps, other

    quant-ph cs.CR

    Weakening Assumptions for Publicly-Verifiable Deletion

    Authors: James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, Michael Walter

    Abstract: We develop a simple compiler that generically adds publicly-verifiable deletion to a variety of cryptosystems. Our compiler only makes use of one-way functions (or one-way state generators, if we allow the public verification key to be quantum). Previously, similar compilers either relied on the use of indistinguishability obfuscation (Bartusek et. al., ePrint:2023/265) or almost-regular one-way f… ▽ More

    Submitted 9 October, 2023; v1 submitted 19 April, 2023; originally announced April 2023.

    Comments: 11 pages

  5. arXiv:2303.08676  [pdf, ps, other

    quant-ph cs.CR

    Publicly-Verifiable Deletion via Target-Collapsing Functions

    Authors: James Bartusek, Dakshita Khurana, Alexander Poremba

    Abstract: We build quantum cryptosystems that support publicly-verifiable deletion from standard cryptographic assumptions. We introduce target-collapsing as a weakening of collapsing for hash functions, analogous to how second preimage resistance weakens collision resistance; that is, target-collapsing requires indistinguishability between superpositions and mixtures of preimages of an honestly sampled ima… ▽ More

    Submitted 9 October, 2023; v1 submitted 15 March, 2023; originally announced March 2023.

    Comments: 52 pages

  6. arXiv:2302.11083  [pdf, ps, other

    quant-ph cs.CR

    Obfuscation of Pseudo-Deterministic Quantum Circuits

    Authors: James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa

    Abstract: We show how to obfuscate pseudo-deterministic quantum circuits in the classical oracle model, assuming the quantum hardness of learning with errors. Given the classical description of a quantum circuit $Q$, our obfuscator outputs a quantum state $\ket{\widetilde{Q}}$ that can be used to evaluate $Q$ repeatedly on arbitrary inputs. Instantiating the classical oracle using any candidate post-quant… ▽ More

    Submitted 19 November, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

  7. arXiv:2209.04520  [pdf, ps, other

    quant-ph cs.CR

    A New Framework for Quantum Oblivious Transfer

    Authors: Amit Agarwal, James Bartusek, Dakshita Khurana, Nishant Kumar

    Abstract: We present a new template for building oblivious transfer from quantum information that we call the "fixed basis" framework. Our framework departs from prior work (eg., Crepeau and Kilian, FOCS '88) by fixing the correct choice of measurement basis used by each player, except for some hidden trap qubits that are intentionally measured in a conjugate basis. We instantiate this template in the quant… ▽ More

    Submitted 9 September, 2022; originally announced September 2022.

  8. arXiv:2207.01754  [pdf, ps, other

    quant-ph cs.CR

    Cryptography with Certified Deletion

    Authors: James Bartusek, Dakshita Khurana

    Abstract: We propose a new, unifying framework that yields an array of cryptographic primitives with certified deletion. These primitives enable a party in possession of a quantum ciphertext to generate a classical certificate that the encrypted plaintext has been information-theoretically deleted, and cannot be recovered even given unbounded computational resources. - For X \in {public-key, attribute-bas… ▽ More

    Submitted 20 April, 2023; v1 submitted 4 July, 2022; originally announced July 2022.

  9. arXiv:2206.14929  [pdf, ps, other

    quant-ph cs.CR

    Succinct Classical Verification of Quantum Computation

    Authors: James Bartusek, Yael Tauman Kalai, Alex Lombardi, Fermi Ma, Giulio Malavolta, Vinod Vaikuntanathan, Thomas Vidick, Lisa Yang

    Abstract: We construct a classically verifiable succinct interactive argument for quantum computation (BQP) with communication complexity and verifier runtime that are poly-logarithmic in the runtime of the BQP computation (and polynomial in the security parameter). Our protocol is secure assuming the post-quantum security of indistinguishability obfuscation (iO) and Learning with Errors (LWE). This is the… ▽ More

    Submitted 29 June, 2022; originally announced June 2022.

    Comments: CRYPTO 2022

  10. arXiv:2106.06094  [pdf, ps, other

    quant-ph cs.CR

    Indistinguishability Obfuscation of Null Quantum Circuits and Applications

    Authors: James Bartusek, Giulio Malavolta

    Abstract: We study the notion of indistinguishability obfuscation for null quantum circuits (quantum null-iO). We present a construction assuming: - The quantum hardness of learning with errors (LWE). - Post-quantum indistinguishability obfuscation for classical circuits. - A notion of ''dual-mode'' classical verification of quantum computation (CVQC). We give evidence that our notion of dual-mode CVQC ex… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

    Comments: arXiv admin note: text overlap with arXiv:1912.04769 by other authors

  11. arXiv:2011.13486  [pdf, ps, other

    quant-ph cs.CR

    One-Way Functions Imply Secure Computation in a Quantum World

    Authors: James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma

    Abstract: We prove that quantum-hard one-way functions imply simulation-secure quantum oblivious transfer (QOT), which is known to suffice for secure computation of arbitrary quantum functionalities. Furthermore, our construction only makes black-box use of the quantum-hard one-way function. Our primary technical contribution is a construction of extractable and equivocal quantum bit commitments based on… ▽ More

    Submitted 2 August, 2024; v1 submitted 26 November, 2020; originally announced November 2020.

  12. arXiv:2011.11212  [pdf, ps, other

    quant-ph cs.CR

    On The Round Complexity of Secure Quantum Computation

    Authors: James Bartusek, Andrea Coladangelo, Dakshita Khurana, Fermi Ma

    Abstract: We construct the first constant-round protocols for secure quantum computation in the two-party (2PQC) and multi-party (MPQC) settings with security against malicious adversaries. Our protocols are in the common random string (CRS) model. - Assuming two-message oblivious transfer (OT), we obtain (i) three-message 2PQC, and (ii) five-round MPQC with only three rounds of online (input-dependent) c… ▽ More

    Submitted 13 August, 2021; v1 submitted 23 November, 2020; originally announced November 2020.

  13. arXiv:2005.12904  [pdf, ps, other

    quant-ph cs.CR

    Post-Quantum Multi-Party Computation

    Authors: Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta

    Abstract: We initiate the study of multi-party computation for classical functionalities (in the plain model) with security against malicious polynomial-time quantum adversaries. We observe that existing techniques readily give a polynomial-round protocol, but our main result is a construction of *constant-round* post-quantum multi-party computation. We assume mildly super-polynomial quantum hardness of lea… ▽ More

    Submitted 20 November, 2020; v1 submitted 22 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: text overlap with arXiv:1912.04769 by other authors