Research Article

An Elliptic Curve Signcryption Scheme and Its Application

Table 2

Performance comparison of three signcryption schemes.

Computational overheadCommunication overhead
SigncryptionUnsigncryption

Tsai’s scheme
Zhou’s scheme
Our scheme