{"title":"评论“RCME:基于声誉激励委员会共识的物联网医疗撮合加密”","authors":"Jiseung Kim;Hyung Tae Lee","doi":"10.1109/TSC.2025.3601977","DOIUrl":null,"url":null,"abstract":"Recently, Yang et al. proposed a reputation incentive committee consensus-based matchmaking scheme (IEEE Transactions on Services Computing, 2024), claiming to achieve indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2). In this work, we present a plaintext recovery attack against their scheme under the adaptive chosen ciphertext attack model, analyze the design and proof flaws enabling the attacks, and suggest a countermeasure to achieve the IND-CCA2 security.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"18 5","pages":"3362-3363"},"PeriodicalIF":5.8000,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comment on “RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare”\",\"authors\":\"Jiseung Kim;Hyung Tae Lee\",\"doi\":\"10.1109/TSC.2025.3601977\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, Yang et al. proposed a reputation incentive committee consensus-based matchmaking scheme (IEEE Transactions on Services Computing, 2024), claiming to achieve indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2). In this work, we present a plaintext recovery attack against their scheme under the adaptive chosen ciphertext attack model, analyze the design and proof flaws enabling the attacks, and suggest a countermeasure to achieve the IND-CCA2 security.\",\"PeriodicalId\":13255,\"journal\":{\"name\":\"IEEE Transactions on Services Computing\",\"volume\":\"18 5\",\"pages\":\"3362-3363\"},\"PeriodicalIF\":5.8000,\"publicationDate\":\"2025-08-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Services Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11134801/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Services Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11134801/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
最近,Yang等人提出了一种基于声誉激励委员会共识的配对方案(IEEE Transactions on Services Computing, 2024),声称在自适应选择密文攻击(IND-CCA2)下实现了不可区分性。本文在自适应选择密文攻击模型下,提出了一种针对其方案的明文恢复攻击,分析了实现该攻击的设计和证明缺陷,并提出了实现IND-CCA2安全的对策。
Comment on “RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare”
Recently, Yang et al. proposed a reputation incentive committee consensus-based matchmaking scheme (IEEE Transactions on Services Computing, 2024), claiming to achieve indistinguishability under adaptive chosen ciphertext attacks (IND-CCA2). In this work, we present a plaintext recovery attack against their scheme under the adaptive chosen ciphertext attack model, analyze the design and proof flaws enabling the attacks, and suggest a countermeasure to achieve the IND-CCA2 security.
期刊介绍:
IEEE Transactions on Services Computing encompasses the computing and software aspects of the science and technology of services innovation research and development. It places emphasis on algorithmic, mathematical, statistical, and computational methods central to services computing. Topics covered include Service Oriented Architecture, Web Services, Business Process Integration, Solution Performance Management, and Services Operations and Management. The transactions address mathematical foundations, security, privacy, agreement, contract, discovery, negotiation, collaboration, and quality of service for web services. It also covers areas like composite web service creation, business and scientific applications, standards, utility models, business process modeling, integration, collaboration, and more in the realm of Services Computing.