Research Article
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
Table 1
Security strength comparison among proxy signcryption schemes.
| ā | LC | WC | DCZ | EA | LWHY | Ours |
| Resistance to key-compromised attack | Yes | Yes | No | No | Yes | Yes | Public verifiability | Yes | Yes | Yes | No | Yes | Yes | Security proof on confidentiality | No | No | No | No | Yes | Yes | Unforgeability proof on proxy credential | No | No | No | No | No | Yes | Unforgeability proof on proxy signcryption | No | No | No | No | Yes | Yes | Resistance to forgery attacks | Yes | Yes | Yes | Yes | No | Yes |
|
|