Advertisement

A Token-Based Single Sign-On Protocol

  • Li Hui
  • Shen Ting
Conference paper
  • 833 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)

Abstract

A token based single sign-on protocol for distribution systems is proposed in this paper. When a user C logs on a system, a centralized authentication server A will authenticate C and issue C a token which is signed by A and includes a session key generated by A as well as a time stamp. C can use the token to access any application server S.S will send the C’s request to the A. Then A will verify the validity of the token. There are two advantages of this protocol: 1) Time synchronization between severs S and the user C is not necessary. 2) All authentication state information such as session key is stored in the token rather than in the memory of A, thus the performance of A can be promoted effectively.We have used SVO logic to do formal analysis of this protocol.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chamberlin, N.: A Brief Overview of Single Single-on Technology [EB/OL] (2000), http://www.gitec.org/assets/pdfs
  2. 2.
    Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5) [S]. RFC 1510 ( September 1993)Google Scholar
  3. 3.
    Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of ACM 21(12), 993–999 (1978)zbMATHCrossRefGoogle Scholar
  4. 4.
    Syverson, P., van Oorschot, P.C.: On unifying some cryptographic protocol logics. In: Proceeding of 1994 IEEE Symposium on Research in Security and Privacy, Oakland,California, pp. 14–28 (May 1994)Google Scholar
  5. 5.
    Syverson, P.: Limitations on Design Principles for Public Key Protocols. In: Proceedings of 1996 IEEE Symposium on Research in Security and Privacy, Oakland,California, pp.  62–72 (May 1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Li Hui
    • 1
  • Shen Ting
    • 1
  1. 1.Key Laboratory of Ministry of Education for Computer and Information SecurityXidian UniversityXi’anChina

Personalised recommendations