Difference set attacks on conjunctive keyword search schemes

Hyun Sook Rhee, ik rae Jeong, Jin Wook Byun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

In a keyword search scheme a user stores encrypted data on an untrusted server and gives a database manager a capability for a keyword which enables a database manager to find encrypted data containing the keyword without revealing the keyword to the database manager. Conjunctive keyword search scheme enables a user to obtain data containing all of several keywords through only one query. One of the security requirements of conjunctive keyword search schemes is that a malicious adversary should not be able to generate new valid capabilities from the observed capabilities. In this paper we show that conjunctive keyword search schemes are not secure. In particular, given two capabilities corresponding two sets of keywords, an adversary is able to generate a new capability corresponding to the difference set of two keywords sets.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages64-74
Number of pages11
Volume4165 LNCS
Publication statusPublished - 2006 Nov 13
Event3rd VLDB Workshop on Secure Data Management, SDM 2006 - Seoul, Korea, Republic of
Duration: 2006 Sep 102006 Sep 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4165 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other3rd VLDB Workshop on Secure Data Management, SDM 2006
CountryKorea, Republic of
CitySeoul
Period06/9/1006/9/11

    Fingerprint

Keywords

  • Conjunctive keyword search
  • Difference set attacks
  • Keyword search
  • Privacy

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Rhee, H. S., Jeong, I. R., Byun, J. W., & Lee, D. H. (2006). Difference set attacks on conjunctive keyword search schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4165 LNCS, pp. 64-74). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4165 LNCS).