▽Cryptology ePrint Archive: Search Results ●11/20 22:21 SubscribeLast updated: 2024-11-20Last updated: 2024-11-19Fine-Grained Non-Interactive Key-Exchange without Idealized Assumptions, and Lower BoundsYuyu Wang, Chuanjie Su, Jiaxin Pan, and Chunxiang XuFurthermore, we generalize the lower bound on users’ storage consumption in the bounded storage model by Dziembowski and Maurer (Eurocrypt 2004) to encompass any multi-party NIKE with extendabili