Security Requirements of a Proxy Signcryption Scheme