--

i don't quite understand your question. The database provider does not have to modify anything on its side, and just does a normal query between two values. Alice just needs to encrypt the values for her range, and pass the SQL query to Bob.

--

--

Prof Bill Buchanan OBE FRSE

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.