Difference set attacks on conjunctive keyword search schemes

Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)


In a keyword search scheme a user stores encrypted data on an untrusted server and gives a database manager a capability for a keyword which enables a database manager to find encrypted data containing the keyword without revealing the keyword to the database manager. Conjunctive keyword search scheme enables a user to obtain data containing all of several keywords through only one query. One of the security requirements of conjunctive keyword search schemes is that a malicious adversary should not be able to generate new valid capabilities from the observed capabilities. In this paper we show that conjunctive keyword search schemes are not secure. In particular, given two capabilities corresponding two sets of keywords, an adversary is able to generate a new capability corresponding to the difference set of two keywords sets.

Original languageEnglish
Title of host publicationSecure Data Management - Third VLDB Workshop, SDM 2006, Proceedings
PublisherSpringer Verlag
Number of pages11
ISBN (Print)3540389849, 9783540389842
Publication statusPublished - 2006
Event3rd VLDB Workshop on Secure Data Management, SDM 2006 - Seoul, Korea, Republic of
Duration: 2006 Sep 102006 Sep 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4165 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other3rd VLDB Workshop on Secure Data Management, SDM 2006
Country/TerritoryKorea, Republic of


  • Conjunctive keyword search
  • Difference set attacks
  • Keyword search
  • Privacy

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Difference set attacks on conjunctive keyword search schemes'. Together they form a unique fingerprint.

Cite this