Selvi, S. Sharmila Deva; Vivek, S. Sree; Rangan, C. Pandu Identity based ring signcryption schemes revisited. (English) Zbl 1260.94055 J. Math-for-Ind. 3, No. A, 33-46 (2011). Summary: Ring signcryption is used to provide a graceful way to leak trustworthy secrets in an anonymous, authenticated and confidential way. To the best of our knowledge, seven identity-based ring signcryption schemes were reported in the literature. In this paper, we show that five of them are insecure in one or the other way. We then propose a new scheme and formally prove its security properties. A comparison of our scheme with the only existing secure scheme by X. Huang et al. [“Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world.” AINA 2005, Los Alamitos: IEEE Computer Society, 649–654 (2005)] shows that our scheme is more efficient than the scheme by Huang et al. (loc. cit.). Cited in 1 Document MSC: 94A60 Cryptography 94A62 Authentication, digital signatures and secret sharing Keywords:ring signcryption; cryptanalysis; provable security; confidentiality; chosen plaintext attack; adaptive chosen ciphertext attack; bilinear pairing; random oracle model PDFBibTeX XMLCite \textit{S. S. D. Selvi} et al., J. Math-for-Ind. 3, No. A, 33--46 (2011; Zbl 1260.94055) Full Text: Link