Journal of Applied Sciences1812-56541812-5662Asian Network for Scientific Information10.3923/jas.2009.1025.1035TooraniMohsenBeheshti ShiraziAli Asghar6200996An elliptic curve-based signcryption scheme is introduced
in this paper that effectively combines the functionalities of digital
signature and encryption and decreases the computational costs and communication
overheads in comparison with the traditional signature-then-encryption
schemes. It simultaneously provides the attributes of message confidentiality,
authentication, integrity, unforgeability, non-repudiation, public verifiability
and forward secrecy of message confidentiality. Since it is based on elliptic
curves and can use any fast and secure symmetric algorithm for encrypting
messages, it has great advantages to be used for security establishment
in store-and-forward applications and when dealing with resource-constrained
devices.]]>Antipa, A., D. Brown, A. Menezes, R. Struik and S. Vanstone,2003Bao, F. and R.H. Deng,1998Elkeelany, O., M.M. Matalgah, K.P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi and J. Qaddour,2002Gamage, C., J. Leiwo and Y. Zheng,1999Han, Y., X. Yang and Y. Hu,2004Hankerson, D., A. Menezes and S. Vanstone,2004Hwang, R.J., C.H. Lai and F.F. Su,2005Jung, H.Y., K.S. Chang, D.H. Lee and J.I. Lim,2001Kaliski, B.,2001Krawczyk, H.,2005Law, L., A. Menezes, M. Qu, J. Solinas and S. Vanstone,2003Menezes, A.,2005Menezes, A. and B. Ustaoglu,2006Myers, M., R. Ankney, A. Malpani, S. Galperin and C. Adams,1999NIST,2007NIST,2000Pinkas, D. and R. Housley,2002Rosen, K.H.,1988Satizábal, C., R. Martínez-Peláez, J. Forné and F. Rico-Novella,2007Strangio, M.A.,2006Stinson, D.R.,2006Toorani, M. and A.A. Beheshti Shirazi,2008Tso, R., T. Okamoto and E. Okamoto,2007Wagstaff, S.S.,2003Zeilenga, K.,2006Zheng, Y.,1997Zheng, Y. and H. Imai,1998