Difference set attacks on conjunctive keyword search schemes

Hyun Sook Rhee, ik rae Jeong, Jin Wook Byun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In a keyword search scheme a user stores encrypted data on an untrusted server and gives a database manager a capability for a keyword which enables a database manager to find encrypted data containing the keyword without revealing the keyword to the database manager. Conjunctive keyword search scheme enables a user to obtain data containing all of several keywords through only one query. One of the security requirements of conjunctive keyword search schemes is that a malicious adversary should not be able to generate new valid capabilities from the observed capabilities. In this paper we show that conjunctive keyword search schemes are not secure. In particular, given two capabilities corresponding two sets of keywords, an adversary is able to generate a new capability corresponding to the difference set of two keywords sets.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages64-74
Number of pages11
Volume4165 LNCS
Publication statusPublished - 2006 Nov 13
Event3rd VLDB Workshop on Secure Data Management, SDM 2006 - Seoul, Korea, Republic of
Duration: 2006 Sep 102006 Sep 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4165 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other3rd VLDB Workshop on Secure Data Management, SDM 2006
CountryKorea, Republic of
CitySeoul
Period06/9/1006/9/11

Fingerprint

Keyword Search
Difference Set
Managers
Attack
Databases
Servers
Server
Valid
Query
Requirements

Keywords

  • Conjunctive keyword search
  • Difference set attacks
  • Keyword search
  • Privacy

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Rhee, H. S., Jeong, I. R., Byun, J. W., & Lee, D. H. (2006). Difference set attacks on conjunctive keyword search schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4165 LNCS, pp. 64-74). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4165 LNCS).

Difference set attacks on conjunctive keyword search schemes. / Rhee, Hyun Sook; Jeong, ik rae; Byun, Jin Wook; Lee, Dong Hoon.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4165 LNCS 2006. p. 64-74 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4165 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rhee, HS, Jeong, IR, Byun, JW & Lee, DH 2006, Difference set attacks on conjunctive keyword search schemes. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4165 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4165 LNCS, pp. 64-74, 3rd VLDB Workshop on Secure Data Management, SDM 2006, Seoul, Korea, Republic of, 06/9/10.
Rhee HS, Jeong IR, Byun JW, Lee DH. Difference set attacks on conjunctive keyword search schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4165 LNCS. 2006. p. 64-74. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Rhee, Hyun Sook ; Jeong, ik rae ; Byun, Jin Wook ; Lee, Dong Hoon. / Difference set attacks on conjunctive keyword search schemes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4165 LNCS 2006. pp. 64-74 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{3648c7851d184431a1f4e594ade20025,
title = "Difference set attacks on conjunctive keyword search schemes",
abstract = "In a keyword search scheme a user stores encrypted data on an untrusted server and gives a database manager a capability for a keyword which enables a database manager to find encrypted data containing the keyword without revealing the keyword to the database manager. Conjunctive keyword search scheme enables a user to obtain data containing all of several keywords through only one query. One of the security requirements of conjunctive keyword search schemes is that a malicious adversary should not be able to generate new valid capabilities from the observed capabilities. In this paper we show that conjunctive keyword search schemes are not secure. In particular, given two capabilities corresponding two sets of keywords, an adversary is able to generate a new capability corresponding to the difference set of two keywords sets.",
keywords = "Conjunctive keyword search, Difference set attacks, Keyword search, Privacy",
author = "Rhee, {Hyun Sook} and Jeong, {ik rae} and Byun, {Jin Wook} and Lee, {Dong Hoon}",
year = "2006",
month = "11",
day = "13",
language = "English",
isbn = "3540389849",
volume = "4165 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "64--74",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Difference set attacks on conjunctive keyword search schemes

AU - Rhee, Hyun Sook

AU - Jeong, ik rae

AU - Byun, Jin Wook

AU - Lee, Dong Hoon

PY - 2006/11/13

Y1 - 2006/11/13

N2 - In a keyword search scheme a user stores encrypted data on an untrusted server and gives a database manager a capability for a keyword which enables a database manager to find encrypted data containing the keyword without revealing the keyword to the database manager. Conjunctive keyword search scheme enables a user to obtain data containing all of several keywords through only one query. One of the security requirements of conjunctive keyword search schemes is that a malicious adversary should not be able to generate new valid capabilities from the observed capabilities. In this paper we show that conjunctive keyword search schemes are not secure. In particular, given two capabilities corresponding two sets of keywords, an adversary is able to generate a new capability corresponding to the difference set of two keywords sets.

AB - In a keyword search scheme a user stores encrypted data on an untrusted server and gives a database manager a capability for a keyword which enables a database manager to find encrypted data containing the keyword without revealing the keyword to the database manager. Conjunctive keyword search scheme enables a user to obtain data containing all of several keywords through only one query. One of the security requirements of conjunctive keyword search schemes is that a malicious adversary should not be able to generate new valid capabilities from the observed capabilities. In this paper we show that conjunctive keyword search schemes are not secure. In particular, given two capabilities corresponding two sets of keywords, an adversary is able to generate a new capability corresponding to the difference set of two keywords sets.

KW - Conjunctive keyword search

KW - Difference set attacks

KW - Keyword search

KW - Privacy

UR - http://www.scopus.com/inward/record.url?scp=33750700470&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33750700470&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33750700470

SN - 3540389849

SN - 9783540389842

VL - 4165 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 64

EP - 74

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -