A secure single sign-on method based on blockchain zero-knowledge proof

A technology of zero-knowledge proof and login method, applied in the field of secure single sign-on and single sign-on based on blockchain zero-knowledge proof, it can solve the problems of frequent notification interaction, untrusted public cloud insecurity, etc. Query pressure, reduce pressure, reduce the effect of interaction

Active Publication Date: 2020-09-22
SOUTH CHINA UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the number of subsystems increases, notification interactions will become more and more frequent, which is very insecure in untrusted public clouds

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure single sign-on method based on blockchain zero-knowledge proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0041] Embodiment: In an untrusted cloud environment, 2 users log in to 5 subsystems;

[0042] The specific simulation parameters are as follows:

[0043] Let the subsystem IDs be 1 to 5 respectively, that is, sys_set={1,2,3,4,5};

[0044] User A is authorized to allow access to subsystems 1, 2, 3, namely auth_sys_set A ={1,2,3};

[0045] User B is authorized to allow access to subsystem 4,5, ie auth_sys_set B ={4,5};

[0046] 1. Log in to the central authentication system stage

[0047] After user A is authenticated by the central authentication system, the session token token allocated A =101, generate accounting account A , and save it to the shared storage area, the address is address A , and put address A and token A =101 sent to user A;

[0048] accounting account A The specific generation steps are as follows:

[0049] 1.1) Extract the coefficients of the constant term (t, a 1 ,a 2 ...a m+1 ), get (1,-107,617,-1116,505)

[0050] t(x-sys 1 )(x-sys 2 )(x...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an incredible cloud center batch resource sharing method based on an exclusive or operation and chaos. In the method, a client A uses an initial secure single sign-on method which is disclosed by the invention and based on a block chain zero-knowledge proof. The method disclosed by the invention is as follows: a central authentication system distributes one globally uniqueidentification for each subsystem; the central authentication system generates one set authorizing accesses to the subsystems for each user; the central authentication system generates one globally unique session token for each user passing login authentication; a user A submits a user name and a password to the central authentication system and applies for the login authentication; the central authentication system verifies the user A; and when the user A accesses a subsystem B, the subsystem B finds a corresponding account in a shared storage area according to a Hash address provided by theuser A and performs verification on the user A according to the following steps. The method disclosed by the invention utilizes the basis of the block chain zero-knowledge proof, the subsystems do notneed to acquire true user information and can judge whether a user has a sign-on right, and the single sign-on security problem in an incredible environment is solved.

Description

technical field [0001] The invention relates to a single sign-on method, in particular to a secure single sign-on method based on blockchain zero-knowledge proof, and belongs to the field of cloud security. Background technique [0002] Under the tide of cloud development, the integration of functions and resources of different systems is the general trend. Integration of different systems is inseparable from single sign-on, which is a unified authentication and authorization mechanism, which means that the same user who accesses protected resources in different systems only needs to log in once, that is, after passing the security verification in an application, When accessing protected resources in other applications, it is no longer necessary to re-login and verify, which is very important to improve user experience. [0003] The traditional token-based single sign-on method has certain deficiencies in the integration of public platforms. The traditional solution requir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L9/3218H04L63/0807H04L63/0815
Inventor 李拥军羊坤谢嵘邹少聪
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products