Table 1: Efficiency comparison - Signcryption.
Scheme Signcryption
SPM BP G
2
M PA
A
∗
2n+ 2 n+ 2 1 2n
B n+ 2 1 − 2n− 2
C n+ 3 1 − 2n− 2
Table 2: Efficiency comparison - Unsigncryption.
Scheme Unsigncryption
SPM BP G
2
M PA
A
∗
n 3 n+ 1 n
B n 3 − 2n− 1
C n 5 − 2n− 1
Table 3: Ciphertext size and public verifiability.
Scheme Ciphertext Size PV
A 2|M | + (n+ 1)|G
1
| + n|Z
∗
q
| No
B 2|M | + (n+ 2)|G
1
| No
C 2|M | + (n+ 4)|G
1
| Yes
A-Huang et al.(Huang et al., 2005), B- Sharmi et al.(Selvi et al., 2009), C-
IBRSC, PV- Public Verifiability, SPM - Scalar Point Multiplication, BP -
Bilinear Pairing, G
2
M - Multiplication of two G
2
elements and PA - Point
Addition.
* This scheme cannot be considered as a provably secure scheme as the
proof given for the model is incorrect.
REFERENCES
Baek, J., Steinfeld, R., and Zheng, Y. (2002). Formal proofs
for the security of signcryption. In PKC 2002: Pro-
ceedings of the 5th International Workshop on Prac-
tice and Theory in Public Key Cryptography, volume
2274 of Lecture Notes in Computer Science, pages
80–98. Springer-Verlag.
Chow, S. S. M., Yiu, S.-M., and Hui, L. C. K. (2005). Effi-
cient identity based ring signature. In ACNS, volume
3531, pages 499–512.
Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005).
Identity-based ring signcryption schemes: Crypto-
graphic primitives for preserving privacy and authen-
ticity in the ubiquitous world. In AINA ’05: Pro-
ceedings of the 19th International Conference on
Advanced Information Networking and Applications,
pages 649–654. IEEE Computer Society.
Li, F., Shirase, M., and Takagi, T. (2008a). Analysis
and improvement of authenticatable ring signcryption
scheme. In International Conference ProvSec-08, Pa-
per appears in Journal of Shanghai Jiaotong Univer-
sity (Science), volume 13-6, pages 679–683.
Li, F., Xiong, H., and Yu, Y. (2008b). An efficient id-based
ring signcryption scheme. In International Confer-
ence on Communications, Circuits and Systems, 2008.
ICCCAS 2008., pages 483–487.
Malone-lee, J. (2002). Identity-based signcryption. Cryp-
tology ePrint Archive, Report 2002/098.
Selvi, S. S. D., Vivek, S. S., and Rangan, C. P. (2009).
On the security of identity based ring signcryption
schemes. In ISC, 12th International Conference, ISC
2009, Pisa, Italy, September 7-9, 2009. Proceedings,
volume 5735 of Lecture Notes in Computer Science,
pages 310–325. Springer.
Vivek, S. S., Selvi, S. S. D., and Rangan, C. P. (2009). On
the security of two ring signcryption schemes. In SE-
CRYPT 2009, pages 219–224. INSTICC Press.
Yu, Y., Li, F., Xu, C., and Sun, Y. (2008). An effi-
cient identity-based anonymous signcryption scheme.
Wuhan University Journal of Natural Sciences, Vol-
ume: 13, Number: 6, December, 2008:670–674.
Zhang, J., Gao, S., Chen, H., and Geng, Q. (2009a). A
novel id-based anonymous signcryption scheme. In
APWeb/WAIM, volume 5446 of Lecture Notes in Com-
puter Science, pages 604–610. Springer.
Zhang, M., Yang, B., Zhu, S., and Zhang, W. (2008). Ef-
ficient secret authenticatable anonymous signcryption
scheme with identity privacy. In PAISI, PACCF and
SOCO ’08: Proceedings of the IEEE ISI 2008 PAISI,
PACCF, and SOCO international workshops on In-
telligence and Security Informatics, pages 126–137.
Springer-Verlag.
Zhang, M., Zhong, Y., Yang, B., and Zhang, W. (2009b).
Analysis and improvement of an id-based anonymous
signcryption model. In ICIC (1), volume 5754 of
Lecture Notes in Computer Science, pages 433–442.
Springer.
Zhu, Z., Zhang, Y., and Wang, F. (Pages 649-654,
http://dx.doi.org/10.1016/j.csi.2008.09.023, 2008).
An efficient and provable secure identity based ring
signcryption scheme. In Computer Standards &
Interfaces.
Zhun, L. and Zhang, F. (2008). Efficient identity based ring
signature and ring signcryption schemes. In Interna-
tional Conference on Computational Intelligence and
Security, 2008. CIS ’08., volume 2, pages 303–307.
AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY
371