Research Article

An Elliptic Curve Signcryption Scheme and Its Application

Table 1

Security comparison of three signcryption schemes.

ConfidentialityUnforgeabilityIntegrityNonrepudiationAvailabilityForward secrecyInternal security

Tsai’s schemeYYYYYNN
Zhou’s schemeYYYYYNN
Our schemeYYYYYYY

Note: “Y” means that the scheme has this property; “N” means that the scheme does not have this property.