Abstract

Difficulties exist in managing password tapping in communication and each server in the existing password authentication scheme. The concept of single sign-on (SSO), which allows one to use linked computing resources and services following only a single authentication, as in general web-based services, was introduced in the distributed computing environment. The major security vulnerabilities for SSO authentication systems are authentication and replay attack. When a user's authentication information is intercepted by an attacker, a normal session can be acquired through a simple replay attack. Accordingly, various studies are being carried out, domestically and internationally, on SSO authentication techniques. For example, some studies use various digital signature methods such as the symmetric key-based algorithm, the RSA signature algorithm, and the Schnorr signature algorithm. Accordingly, this paper proposes a token-based, and NIZK verification-based SSO authentication techniques that provide privac...

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.