Our main result is a constant-round protocol that exhibit the square of $\log e$ communication and the square of $\log e$ exponentiations with simulation-based security. At the heart of the construction is perfect $k$-ary index and corresponding zero-knowledge proof techniques. We consider a more general case of the problem where the interval is substituted by a union of intervals.
Category / Keywords: cryptographic protocols / private interval check, secure integer comparison, malicious model, zero-knowledge proof, $k$-ary tree index, location-based access control Date: received 3 Sep 2014 Contact author: genqiang80 at gmail com Available format(s): PDF | BibTeX Citation Version: 20140904:061028 (All versions of this report) Short URL: ia.cr/2014/690 Discussion forum: Show discussion | Start new discussion