DISTRIBUTED SINGLE SIGN ON TECHNOLOGIES INCLUDING PRIVACY PROTECTION AND PROACTIVE UPDATING
First Claim
1. A distributed single sign-on system comprising a plurality of n authentication servers associated with a service provider operable to provide a service to a user, wherein a secret key KS associated with the service provider is split into n distinct secret key shares, each distinct secret key share KSi associated with authentication server Ai of the plurality of n authentication servers where 1≦
- i≦
n, and wherein each distinct secret key share KSi is sent to its associated authentication server Ai along with a service provider identifier SID, and wherein each authentication server Ai stores the distinct secret key share KSi in association with the service provider identifier SID.
2 Assignments
0 Petitions
Accused Products
Abstract
Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed single sign-on technologies provide a set of authentication servers and methods for privacy protection based on splitting secret keys and user profiles into secure shares and periodically updating shares among the authentication servers without affecting the underlying secrets. The correctness of the received partial token or partial profiles can be verified with non-interactive zero-knowledge proofs.
169 Citations
20 Claims
-
1. A distributed single sign-on system comprising a plurality of n authentication servers associated with a service provider operable to provide a service to a user, wherein a secret key KS associated with the service provider is split into n distinct secret key shares, each distinct secret key share KSi associated with authentication server Ai of the plurality of n authentication servers where 1≦
- i≦
n, and wherein each distinct secret key share KSi is sent to its associated authentication server Ai along with a service provider identifier SID, and wherein each authentication server Ai stores the distinct secret key share KSi in association with the service provider identifier SID. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
- i≦
-
19. A method for updating an original share of a secret, the method performed by each authentication server Ai of a plurality of n authentication servers, where 1≦
- i≦
n, the method comprising;generating a random polynomial fi,update(x) of order t−
1 with a constant of 0 where 1≦
t≦
n;computing an updating value Si,j=fi,update(xj), where 1≦
j≦
n, corresponding to each authentication server Aj;distributing each update value Si,j to the corresponding authentication server Aj; and updating the original share by adding the updating values received from the n authentication servers to the original share wherein the original share at each authentication server Ai is updated without changing the related secret.
- i≦
-
20. A method of splitting a secret number Pf into a plurality of n shares Pf,Si, 1≦
- i≦
n, the method comprising;selecting a secret number S, 1<
S<
q−
1, where q is a large prime number that divides the Euler totient function of a large prime p;calculating S 1mod q and Pf,S=(Pf)S 1 mod p;generating a random polynomial f(x) of order t−
1 with random coefficients and with a constant S, where 1≦
t≦
n, andcomputing the plurality of n shares wherein each share Pf,Si, 1≦
i≦
n, is calculated by first computing vi=f(xi) for a set of n distinctive values {xi ∈
Zq\{0}}, where Zq represents integers from 0 to q−
1, and then computing Pf,Si=(Pf,S)vi , 1≦
i≦
n, wherein any t shares from the set of n shares Pf,Si, 1≦
i≦
n can be used to reconstruct the secret number Pf.
- i≦
Specification