Research Article
An Elliptic Curve Signcryption Scheme and Its Application
Table 1
Security comparison of three signcryption schemes.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note: “Y” means that the scheme has this property; “N” means that the scheme does not have this property. |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note: “Y” means that the scheme has this property; “N” means that the scheme does not have this property. |