PKAuth: A Social Login Protocol for Unregistered Applications

نویسندگان

  • Francisco Corella
  • Karen P. Lewison
چکیده

Social login is a double-redirection mechanism whereby a Web application delegates user authentication to a social site and obtains access to the user’s social context. Today social login is implemented using OAuth, which requires registration of the application with the site for authentication of the application to the site and identification of the application to the user by the site. As social login gains in popularity, this may lead to a situation where every application must register with the dominant social site (currently Facebook) just to be able to authenticate its users, and the dominant social site has the power to disable any application on the Web by revoking its registration. PKAuth is a protocol for social login that does not require registration and yet provides strong application authentication and identification. It relies for that purpose on the public key infrastructure of the Web. The application submits its TLS certificate as client certificate in a TLS handshake, and the site identifies the application to the user by displaying the information contained in the certificate. Additional information about the application may be provided to the site by a holder-of-key assertion or by optional prior registration.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of "an efficient and complete remote user authentication scheme"

Recently, Liaw et al. proposed a remote user authentication scheme using smart cards. Their scheme has claimed a number of features e.g. mutual authentication, no clock synchronization, no verifier table, flexible user password change, etc. We show that Liaw et al.'s scheme is completely insecure. By intercepting a valid login message in Liaw et al.'s scheme, any unregistered user or adversary ...

متن کامل

A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity...

متن کامل

Explaining individual- and country-lEvEl variations in unrEgistErEd EmploymEnt using a multi-lEvEl modEl: EvidEncE from 35 Eurasian countriEs

The aim of this paper is to evaluate the individualand country-level variations in unregistered employment. To analyse whether it is marginalised groups who are more likely to engage in unregistered employment and explain the country-level variations, a 2010 Life in Transition Survey (LiTS) involving 38,864 interviews in 35 Eurasian countries is reported. Multilevel logistic regression analysis...

متن کامل

A Unlinkable Delegation-based Authentication Protocol with Users’ Non- repudiation for Portable Communication Systems

For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, user privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an unreasonable assumption that home location registers are always trusted. To weaken this assumption and enhanc...

متن کامل

Analysis of Purchasing Tendency using ID-POS Data of Social Login User

This study targets social login registrants on an EC site and aims to clarify the difference between the purchasing tendency of social login registrants and general members by analyzing product purchasing history. The authors focused on the golf portal site that is the subject of this research. The authors analyzed the purchasing data comparing social login registrants with general members. It ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011