Research Article

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

Table 1

Security strength comparison among proxy signcryption schemes.

ā€‰LCWCDCZEALWHYOurs

Resistance to key-compromised attack YesYesNoNoYesYes
Public verifiabilityYesYesYesNoYesYes
Security proof on confidentialityNoNoNoNoYesYes
Unforgeability proof on proxy credential NoNoNoNoNoYes
Unforgeability proof on proxy signcryption NoNoNoNoYesYes
Resistance to forgery attacksYesYesYesYesNoYes