@inproceedings{3648c7851d184431a1f4e594ade20025,
title = "Difference set attacks on conjunctive keyword search schemes",
abstract = "In a keyword search scheme a user stores encrypted data on an untrusted server and gives a database manager a capability for a keyword which enables a database manager to find encrypted data containing the keyword without revealing the keyword to the database manager. Conjunctive keyword search scheme enables a user to obtain data containing all of several keywords through only one query. One of the security requirements of conjunctive keyword search schemes is that a malicious adversary should not be able to generate new valid capabilities from the observed capabilities. In this paper we show that conjunctive keyword search schemes are not secure. In particular, given two capabilities corresponding two sets of keywords, an adversary is able to generate a new capability corresponding to the difference set of two keywords sets.",
keywords = "Conjunctive keyword search, Difference set attacks, Keyword search, Privacy",
author = "Rhee, {Hyun Sook} and Jeong, {Ik Rae} and Byun, {Jin Wook} and Lee, {Dong Hoon}",
year = "2006",
doi = "10.1007/11844662_5",
language = "English",
isbn = "3540389849",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "64--74",
booktitle = "Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings",
note = "3rd VLDB Workshop on Secure Data Management, SDM 2006 ; Conference date: 10-09-2006 Through 11-09-2006",
}