AbstractSigncryption is an advanced technique that combines both signature and encryption in one step which costs lower than any ordinary signature‐then‐encryption technique. Many ID‐based signcryption () techniques have been constructed, but they are considered secure in the random Oracle (RO) model, where the proofs in this environment are criticized as it always depends on the assumption that Oracle is truly random. This assumption of RO is not possible in reality. Therefore, many of the ID‐based signcryptions were proposed in the widely accepted standard model. As signcryption schemes have much important application, the verification of their correctness, security, and performance are required. In this article, we have discussed two important security features in the standard model under decision bilinear Diffie‐Hellman (DBDH) and computational Diffie‐Hellman(CDH) assumptions, namely, (a) indistinguishable against chosen cipher text attack and (b) indistinguishable against chosen‐plaintext attack. To understand the security of existing schemes, we present cryptanalysis, which illustrates weak security. The study on performance is also performed to analyze the communication and computational efficiency. The study of performance and security analysis helps us to understand the requirement of signcryption scheme in standard model.