{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:49:58Z","timestamp":1777704598562,"version":"3.51.4"},"reference-count":20,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2020,12,4]]},"abstract":"<jats:p>With the growing trend of Communication Technologies (ICT), buying goods through online has been increased drastically. Besides, e-payment makes online purchase easier and made our daily life more convenient. However, there exists a user privacy and data security issue in conventional e-payment systems. Thus, a hyper elliptic curve based signcryption scheme is proposed to achieve reduced computational cost. Because, most of the payment is processed on resource constraint devices like smart phone, hence an energy efficient e-payment system is in requisite. In order to ensure user authenticity, an aadhaar number (unique identity) is used to generate signcryption key. The proposed signcryption scheme can be implemented in real-time applications like e-payment system to ensure confidentiality, privacy, authenticity and integrity. The security of the system is validated through a simulation tool \u2013 AVISPA (Automated Validation of Internet Security Protocols and Applications). Further, the resistivity against various cryptographic attacks was analyzed informally and also the computational cost is estimated and compared with other related schemes.<\/jats:p>","DOI":"10.3233\/jifs-189144","type":"journal-article","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T14:58:49Z","timestamp":1597157929000},"page":"8237-8247","source":"Crossref","is-referenced-by-count":2,"title":["A secured signcryption scheme for e-payment system using hyper elliptic curve"],"prefix":"10.1177","volume":"39","author":[{"given":"Malathi","family":"Devarajan","sequence":"first","affiliation":[{"name":"School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India"}]},{"given":"N.","family":"Sasikaladevi","sequence":"additional","affiliation":[{"name":"School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-189144_ref1","doi-asserted-by":"crossref","unstructured":"Chaum D. , Blind signatures for untraceable payments, In Advances in Cryptology (pp. 199\u2013203). Springer, Boston, MA. (1983).","DOI":"10.1007\/978-1-4757-0602-4_18"},{"issue":"3","key":"10.3233\/JIFS-189144_ref2","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1016\/j.jnca.2008.08.003","article-title":"An incentive-based electronic payment scheme for digital content transactions over the Internet","volume":"32","author":"Lin","year":"2009","journal-title":"Journal of Network and Computer Applications"},{"issue":"5","key":"10.3233\/JIFS-189144_ref3","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.elerap.2011.01.004","article-title":"Provably-secure electronic cash based on certificateless partially-blind signatures","volume":"10","author":"Zhang","year":"2011","journal-title":"Electronic Commerce Research and Applications"},{"key":"10.3233\/JIFS-189144_ref4","doi-asserted-by":"crossref","unstructured":"Yen Y.C. , Wu T.C. , Lo N.W. and Tsai K.Y. , A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability, KSII Transactions on Internet & Information Systems 6(11) (2012).","DOI":"10.3837\/tiis.2012.11.012"},{"key":"10.3233\/JIFS-189144_ref5","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.future.2013.07.015","article-title":"New and efficient conditional e-payment systems with transferability","volume":"37","author":"Chen","year":"2014","journal-title":"Future Generation Computer Systems"},{"key":"10.3233\/JIFS-189144_ref7","doi-asserted-by":"crossref","unstructured":"Singh A.K. , A review of elliptic curve based signcryption schemes, International Journal of Computer Applications 102(6) (2014).","DOI":"10.5120\/17821-8769"},{"issue":"3","key":"10.3233\/JIFS-189144_ref8","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.35940\/ijrte.C4420.098319","article-title":"An Efficient Signcryption Scheme for Secure Authentication using Hyper Elliptic Curve Cryptography and Keccak Hashing","volume":"8","author":"Rajasekar","year":"2019","journal-title":"International Journal of Recent Technology and Engineering"},{"issue":"4","key":"10.3233\/JIFS-189144_ref9","doi-asserted-by":"crossref","first-page":"315","DOI":"10.5755\/j01.itc.42.4.2150","article-title":"An efficient authenticated encryption scheme based on ECC and its application for electronic payment","volume":"42","author":"Yang","year":"2013","journal-title":"Information Technology and Control"},{"issue":"4","key":"10.3233\/JIFS-189144_ref10","doi-asserted-by":"crossref","first-page":"387","DOI":"10.5755\/j01.itc.44.4.9197","article-title":"An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks","volume":"44","author":"Heydari","year":"2015","journal-title":"Information Technology and Control"},{"issue":"1","key":"10.3233\/JIFS-189144_ref11","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s10660-015-9192-5","article-title":"A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography","volume":"16","author":"Chaudhry","year":"2016","journal-title":"Electronic Commerce Research"},{"issue":"1","key":"10.3233\/JIFS-189144_ref12","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1177\/1748301817727123","article-title":"A fair electronic payment system for digital content using elliptic curve cryptography","volume":"12","author":"Kang","year":"2018","journal-title":"Journal of Algorithms & Computational Technology"},{"key":"10.3233\/JIFS-189144_ref13","doi-asserted-by":"crossref","first-page":"17981","DOI":"10.1109\/ACCESS.2019.2896324","article-title":"Automated user authentication in wireless public key infrastructure for mobile devices using Aadhar card","volume":"7","author":"Prakasha","year":"2019","journal-title":"IEEE Access"},{"issue":"8","key":"10.3233\/JIFS-189144_ref16","doi-asserted-by":"crossref","first-page":"686","DOI":"10.3390\/math7080686","article-title":"A Novel Provable Secured Signcryption Scheme PSSS: A Hyper-Elliptic Curve-Based Approach","volume":"7","author":"Ullah","year":"2019","journal-title":"Mathematics"},{"key":"10.3233\/JIFS-189144_ref18","unstructured":"Kumar P. , Singh A. and Tyagi A.D. , Implementation of Hyperelliptic Curve Based Signcryption Approach, International Journal of Scientific and Engineering Research 4(7) (2013)."},{"issue":"12","key":"10.3233\/JIFS-189144_ref19","first-page":"194","article-title":"Multi Receiver Signcryption Based On Hyper Elliptic Curve Cryptosystem","volume":"7","author":"Sadat","year":"2017","journal-title":"J Appl Environ Biol Sci"},{"issue":"7","key":"10.3233\/JIFS-189144_ref20","first-page":"90","article-title":"ASEC: anonym signcryption scheme based on EC operations","volume":"5","author":"Braeken","year":"2015","journal-title":"International Journal of Computer Applications"},{"issue":"5","key":"10.3233\/JIFS-189144_ref22","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/S0020-0190(98)00167-7","article-title":"How to construct efficient signcryption schemes on elliptic curves","volume":"68","author":"Zheng","year":"1998","journal-title":"Information Processing Letters"},{"issue":"5","key":"10.3233\/JIFS-189144_ref26","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1007\/s11042-014-2283-9","article-title":"An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography","volume":"74","author":"Ch","year":"2015","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"10.3233\/JIFS-189144_ref27","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","article-title":"A survey of SIP authentication and key agreement schemes","volume":"16","author":"Kilinc","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"10.3233\/JIFS-189144_ref28","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1504\/IJCSM.2018.090727","article-title":"Elliptic curve based authenticated encryption scheme and its application for electronic payment system","volume":"9","author":"Kumar","year":"2018","journal-title":"International Journal of Computing Science and Mathematics"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-189144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:34Z","timestamp":1777455694000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-189144"}},"subtitle":[],"editor":[{"given":"Vijayakumar","family":"Varadarajan","sequence":"additional","affiliation":[]},{"given":"Piet","family":"Kommers","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[]},{"given":"V.","family":"Subramaniyaswamy","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":20,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.3233\/jifs-189144","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,4]]}}}