{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:40Z","timestamp":1777704640619,"version":"3.51.4"},"reference-count":27,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2020,12,4]]},"abstract":"<jats:p>With ever growing popularity, wireless communication system also vulnerable to various security attacks. To provide high level security, many cryptographic solutions have been proposed. One such solution is signcryption, where authenticity and confidentiality provided by single logical step. Therefore, signcryption scheme helps to reduce computational cost, but it is not feasible for resource constraint environments. Because, most of the existing approaches were based on El-Gamal, bilinear pairing, Rivest-Shamir-Adleman (RSA), and Elliptic curve Cryptography (ECC). They consume more energy due to their increased key size. Hence, the new signcryption approach is proposed based on Hyper Elliptic Curve Cryptosystem (HECC) whose key size is much lesser than ECC. It significantly reduces the cost of computation and communication overhead by half the amount of ECC which suits well for resource constraint environments. Further, the proposed scheme attains necessary security features along with forward secrecy and public verifiability. On the other hand, the security of the approach is validated through an automated protocol validation tool \u2013 AVISPA.<\/jats:p>","DOI":"10.3233\/jifs-189166","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T13:37:22Z","timestamp":1601645842000},"page":"8487-8498","source":"Crossref","is-referenced-by-count":3,"title":["An hyper elliptic curve based efficient signcryption scheme for user authentication"],"prefix":"10.1177","volume":"39","author":[{"given":"Malathi","family":"Devarajan","sequence":"first","affiliation":[{"name":"School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India"}]},{"given":"N.","family":"Sasikaladevi","sequence":"additional","affiliation":[{"name":"School of Computing, SASTRA Deemed University, Thanjavur, Tamil Nadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-189166_ref1","unstructured":"Stallings W. , Network and internetwork security: principles and practice (Vol. 1). Englewood Cliffs, NJ: Prentice Hall, (1995)."},{"key":"10.3233\/JIFS-189166_ref2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/BIGCOM.2017.51","article-title":"A review of signcryption schemes based on hyper elliptic curve","author":"Ullah","year":"2017","journal-title":"2017 3rd International Conference on Big Data Computing and Communications (BIGCOM)"},{"issue":"12","key":"10.3233\/JIFS-189166_ref3","first-page":"69","article-title":"Public Verifiable Generalized Authenticated Encryption (\u2119\u2119\u20a2 \u01e2) based on Hyper Elliptic Curve","volume":"7","author":"Mehmood","year":"2017","journal-title":"J Appl Environ Biol Sci"},{"key":"10.3233\/JIFS-189166_ref4","first-page":"1","article-title":"Efficient signcryption schemes based on hyperelliptic curve cryptosystem","author":"Ch","year":"2011","journal-title":"2011 7th International Conference on Emerging Technologies"},{"issue":"7","key":"10.3233\/JIFS-189166_ref5","first-page":"90","article-title":"ASEC: anonym signcryption scheme based on EC operations","volume":"5","author":"Braeken","year":"2015","journal-title":"International Journal of Computer Applications"},{"key":"10.3233\/JIFS-189166_ref6","volume-title":"International Workshop on Information Security","author":"Zheng","year":"1997"},{"key":"10.3233\/JIFS-189166_ref7","doi-asserted-by":"crossref","first-page":"546","DOI":"10.4028\/www.scientific.net\/AMM.20-23.546","article-title":"Improved Signcryption Schemes Based on Hyper-elliptic Curves Cryptosystem","volume":"20","author":"Zhou","year":"2010","journal-title":"Applied Mechanics and Materials"},{"key":"10.3233\/JIFS-189166_ref8","first-page":"165","article-title":"Digital signcryption or how to achieve cost (signature & encryption)< <cost (signature)+cost (encryption)","author":"Zheng","year":"1997","journal-title":"Annual international cryptology conference"},{"issue":"5","key":"10.3233\/JIFS-189166_ref9","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/S0020-0190(98)00167-7","article-title":"How to construct efficient signcryption schemes on elliptic curves","volume":"68","author":"Zheng","year":"1998","journal-title":"Information processing letters"},{"issue":"2","key":"10.3233\/JIFS-189166_ref10","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1016\/j.amc.2004.06.124","article-title":"An efficient signcryption scheme with forward secrecy based on elliptic curve","volume":"167","author":"Hwang","year":"2005","journal-title":"Applied Mathematics and computation"},{"key":"10.3233\/JIFS-189166_ref11","doi-asserted-by":"crossref","unstructured":"Toorani M. , Beheshti A.A. , An elliptic curve-based signcryption scheme with forward secrecy, preprint arXiv:1005.1856 (2010).","DOI":"10.3923\/jas.2009.1025.1035"},{"key":"10.3233\/JIFS-189166_ref12","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-94-007-5860-5_17","article-title":"An improved forward secure elliptic curve signcryption key management scheme for wireless sensor networks","author":"Bala","year":"2013","journal-title":"IT Convergence and Security 2012"},{"issue":"3","key":"10.3233\/JIFS-189166_ref13","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/BF02252872","article-title":"Hyperelliptic cryptosystems","volume":"1","author":"Koblitz","year":"1989","journal-title":"Journal of cryptology"},{"issue":"3","key":"10.3233\/JIFS-189166_ref14","first-page":"121","article-title":"A Novel Digital Envelope Approach for A Secure E-Commerce Channel","volume":"11","author":"Ganesan","year":"2010","journal-title":"IJ Network Security"},{"key":"10.3233\/JIFS-189166_ref15","first-page":"244","article-title":"Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem","author":"Ch","year":"2011","journal-title":"8th International Conference on High-capacity Optical Networks and Emerging Technologies"},{"key":"10.3233\/JIFS-189166_ref16","first-page":"135","article-title":"Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem","author":"Ch","year":"2012","journal-title":"International Conference on Information Systems, Technology and Management"},{"issue":"5","key":"10.3233\/JIFS-189166_ref17","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1007\/s11042-014-2283-9","article-title":"An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography","volume":"74","author":"Ch","year":"2015","journal-title":"Multimedia Tools and Applications"},{"issue":"12","key":"10.3233\/JIFS-189166_ref18","first-page":"194","article-title":"Multi Receiver Signcryption Based On Hyper Elliptic Curve Cryptosystem","volume":"7","author":"Sadat","year":"2017","journal-title":"J Appl Environ Biol Sci"},{"key":"10.3233\/JIFS-189166_ref19","doi-asserted-by":"crossref","unstructured":"Singh A.K. , A review of elliptic curve based signcryption schemes, International Journal of Computer Applications 102(6) (2014).","DOI":"10.5120\/17821-8769"},{"key":"10.3233\/JIFS-189166_ref20","unstructured":"Stallings W. , Cryptography and network security: principles and practice, international edition: principles and practice. Pearson Higher Ed., (2014)."},{"key":"10.3233\/JIFS-189166_ref21","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","article-title":"Automated security protocol analysis with the AVISPA tool","volume":"155","author":"Vigan\u00f2","year":"2006","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"8","key":"10.3233\/JIFS-189166_ref22","doi-asserted-by":"crossref","first-page":"686","DOI":"10.3390\/math7080686","article-title":"A Novel Provable Secured Signcryption Scheme PSSS: A Hyper-Elliptic Curve-Based Approach","volume":"7","author":"Ullah","year":"2019","journal-title":"Mathematics"},{"key":"10.3233\/JIFS-189166_ref23","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"International conference on computer aided verification","author":"Armando","year":"2005"},{"key":"10.3233\/JIFS-189166_ref24","unstructured":"Tutorial H.L.P.S.L. , A Beginner\u2019s Guide to Modelling and Analysing Internet Security Protocols Available at [AH-03], (2009)."},{"key":"10.3233\/JIFS-189166_ref26","unstructured":"Takkinen L. , Analysing security protocols with AVISPA, In TKK T-110.7290 research seminar on network security, (2006)."},{"issue":"2","key":"10.3233\/JIFS-189166_ref27","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Transactions on information theory"},{"issue":"1","key":"10.3233\/JIFS-189166_ref28","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1504\/IJCSM.2018.090727","article-title":"Elliptic curve based authenticated encryption scheme and its application for electronic payment system","volume":"9","author":"Kumar","year":"2018","journal-title":"International Journal of Computing Science and Mathematics"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-189166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:41Z","timestamp":1777455701000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-189166"}},"subtitle":[],"editor":[{"given":"Vijayakumar","family":"Varadarajan","sequence":"additional","affiliation":[]},{"given":"Piet","family":"Kommers","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[]},{"given":"V.","family":"Subramaniyaswamy","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":27,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.3233\/jifs-189166","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,4]]}}}