Paper 2014/690
Efficient Interval Check in the Presence of Malicious Adversaries
Genqiang Wu, Yeping He, Yi Lu, and Liping Ding
Abstract
We consider the following problem: Assuming that Alice and Bob have an integer interval
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Keywords
- private interval checksecure integer comparisonmalicious modelzero-knowledge proof
-ary tree indexlocation-based access control - Contact author(s)
- genqiang80 @ gmail com
- History
- 2014-09-04: received
- Short URL
- https://ia.cr/2014/690
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/690, author = {Genqiang Wu and Yeping He and Yi Lu and Liping Ding}, title = {Efficient Interval Check in the Presence of Malicious Adversaries}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/690}, year = {2014}, url = {https://eprint.iacr.org/2014/690} }