
{"id":3535,"date":"2020-07-03T16:23:08","date_gmt":"2020-07-03T16:23:08","guid":{"rendered":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems\/"},"modified":"2025-01-15T06:29:47","modified_gmt":"2025-01-15T06:29:47","slug":"researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems","status":"publish","type":"post","link":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems","title":{"rendered":"Researchers develop cryptographic scheme to protect personal information in single sign-on systems"},"content":{"rendered":"<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">Over the last few decades, as the information era has matured, it has shaped the world of cryptography and made it a varied landscape. Amongst the myriad of encoding methods and cryptosystems currently available for ensuring secure data transfers and user identification, some have become quite popular because of their safety or practicality. For example, if<\/span><span style=\"font-family:&quot;Calibri&quot;,sans-serif\"> you have ever been given the option to log onto a website using your Facebook or Gmail ID and password, you have encountered a single sign-on (SSO) system at work. The same goes for most smartphones, where signing in with a single username and password combination allows access to many different services and applications.<\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">SSO schemes give users the option to access multiple systems by signing in to just one specific system. This specific system is called the \u201cidentity provider\u201d and is regarded as a trusted entity that can verify and store the identity of the user. When the user attempts to access a service via the SSO, the \u201cservice provider\u201d asks this identity provider to authenticate the user. <\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">The advantages of SSO systems are many. For one, users need not remember several username and password combinations for each website or application. This translates into fewer people forgetting their passwords and, in turn, fewer telephone calls to IT support centers. Moreover, SSO reduces the hassle of logging in, which can, for example, encourage employees to use their company\u2019s security-oriented tools for tasks such as secure file transfer. <\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">But with these advantages come some grave concerns. SSO systems are often run by Big Tech companies, who have, in the past, been reported to gather people\u2019s personal information from apps and websites (service providers) without their consent, for targeted advertising and other marketing purposes. Some people are also concerned that their ID and password could be stored locally by third parties when they provide them to the SSO mechanism. <\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">In an effort to address these problems, Associate Professor Satoshi Iriyama from Tokyo University of Science and his colleague Dr Maki Kihara have recently developed a new SSO algorithm that on principle prevents such holistic information exchange. In their paper, published in <span class=\"MsoHyperlink\" style=\"color:blue\"><span style=\"text-decoration:underline\"><i><a href=\"https:\/\/www.mdpi.com\/2410-387X\/4\/2\/16\" style=\"color:blue; text-decoration:underline\">Cryptography<\/a><\/i><\/span><\/span>, they describe the new algorithm in great detail after going over their motivations for developing it. Dr Iriyama states: \u201c<i>We aimed to develop an SSO algorithm that does not disclose the user\u2019s identity and sensitive personal information to the service provider. In this way, our SSO algorithm uses personal information only for authentication of the user, as originally intended when SSO systems were introduced.<\/i>\u201d <\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">Because of the way this SSO algorithm is designed, it is impossible in essence for user information to be disclosed without authorization. This is achieved, as explained by Dr Iriyama, by applying the principle of \u201chandling information while it is still encrypted.\u201d In their SSO algorithm, all parties exchange encrypted messages but never exchange decryption keys, and no one is ever in possession of all the pieces of the puzzle because no one has the keys to all the information. While the service provider (not the identity provider) gets to know whether a user was successfully authenticated, they do not get access to the user\u2019s identity and any of their sensitive personal information. This in turn breaks the link that allows identity providers to draw specific user information from service providers.<\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">The proposed scheme offers many other advantages. In terms of security, it is impervious by design to all typical forms of attack by which information or passwords are stolen. For instance, as Dr Iriyama explains, \u201c<i>Our algorithm can be used not only with an ID and a password, but also with any other type of identity information, such as biometrics, credit card data, and unique numbers known by the user<\/i><i>.\u201d<\/i> This also means that users can only provide identity information that they wish to disclose, reducing the risk of Big Tech companies or other third parties siphoning off personal information. In addition, the algorithm runs remarkably fast, an essential quality to ensure that the computational burden does not hinder its implementation. <\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">This study will hopefully bring about positive changes in current SSO systems, so that more users are encouraged to use them and reap their many benefits.<\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><b><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">Reference<\/span><\/b><\/span><\/span><\/p>\n<p style=\"margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-size:11.0pt\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">Title of original paper: Security and Performance of Single Sign-On Based on One-Time Pad Algorithm<\/span><\/span><\/span><\/span><\/p>\n<p style=\"margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-size:11.0pt\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">Journal: <i>Cryptography<\/i><\/span><\/span><\/span><\/span><\/p>\n<p style=\"margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"tab-stops:130.5pt\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-size:11.0pt\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">DOI: <span class=\"MsoHyperlink\" style=\"color:blue\"><span style=\"text-decoration:underline\"><a href=\"https:\/\/doi.org\/10.3390\/cryptography4020016\" style=\"color:blue; text-decoration:underline\">10.3390\/cryptography4020016<\/a><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p class=\"Default\" style=\"margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p class=\"Default\" style=\"margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"font-family:Calibri,sans-serif\"><span style=\"color:black\"><b>About <\/b><b>the Tokyo University of Science<\/b><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\"><a href=\"https:\/\/www.tus.ac.jp\/en\/mediarelations\/\">Tokyo University of Science<\/a> (TUS) is a well-known and respected university, and the largest science-specialized private research university in Japan, with four campuses in central Tokyo and its suburbs and in Hokkaido. Established in 1881, the university has continually contributed to Japan&#8217;s development in science through inculcating the love for science in researchers, technicians, and educators. <\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\">\u00a0<\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">With a mission of \u201cCreating science and technology for the harmonious development of nature, human beings, and society&#8221;, TUS has undertaken a wide range of research from basic to applied science. TUS has embraced a multidisciplinary approach to research and undertaken intensive study in some of today&#8217;s most vital fields. TUS is a meritocracy where the best in science is recognized and nurtured. It is the only private university in Japan that has produced a Nobel Prize winner and the only private university in Asia to produce Nobel Prize winners within the natural sciences field. <\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"font-family:Calibri,sans-serif\"><span style=\"color:black\"><b>About Associate Professor Satoshi Iriyama from Tokyo University of Science<\/b><\/span><\/span><\/span><\/p>\n<p class=\"Default\" style=\"text-align:justify; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"text-justify:inter-ideograph\"><span style=\"font-family:Calibri,sans-serif\"><span style=\"color:black\">Satoshi Iriyama\u2019s history with Tokyo University of Science (TUS) dates back to 1999, when he completed his undergrad studies in the Department of Information Sciences. He proceeded to obtain Master\u2019s and PhD degrees at TUS over the following years and has been an Associate Professor in the Department of Information Sciences there since 2007. His research interests are quantum communication, quantum algorithms, and cryptography. He has written over 35 papers on these subjects, along with 16 refereed proceedings. <\/span><\/span><\/span><\/span><\/p>\n<p class=\"Default\" style=\"margin:0in 0in 0.0001pt\">\u00a0<\/p>\n<p class=\"Default\" style=\"margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><b><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">Media contact<\/span><\/b><\/span><\/span><\/p>\n<p style=\"margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-size:11.0pt\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">Tsutomu Shimizu <\/span><\/span><\/span><\/span><\/p>\n<p style=\"margin-left:.9pt; margin:0in 0in 0.0001pt\"><span style=\"font-size:12pt\"><span style=\"tab-stops:131.15pt\"><span style=\"font-family:&quot;Times New Roman&quot;,serif\"><span style=\"font-size:11.0pt\"><span style=\"font-family:&quot;Calibri&quot;,sans-serif\">Email: <span class=\"MsoHyperlink\" style=\"color:blue\"><span style=\"text-decoration:underline\"><a href=\"mailto:mediaoffice@admin.tus.ac.jp\" style=\"color:blue; text-decoration:underline\">mediaoffice@admin.tus.ac.jp<\/a><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last few decades, as the information era has matured, it has shaped the world of cryptography and made it a varied landscape. Amongst the myriad of encoding methods and cryptosystems currently available for ensuring secure data transfers and user identification, some have become quite popular because of their safety or practicality. For example, [&hellip;]<\/p>\n","protected":false},"author":1152,"featured_media":33313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2435],"tags":[2482],"new_categories":[],"new_tags":[],"series":[],"class_list":["post-3535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trending-research","tag-science-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Researchers develop cryptographic scheme to protect personal information in single sign-on systems | Editage Insights<\/title>\n<meta name=\"description\" content=\"Researchers at Tokyo University of Science develop cryptographic scheme to protect personal information in single sign-on systems\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers develop cryptographic scheme to protect personal information in single sign-on systems | Editage Insights\" \/>\n<meta property=\"og:description\" content=\"Researchers at Tokyo University of Science develop cryptographic scheme to protect personal information in single sign-on systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems\" \/>\n<meta property=\"og:site_name\" content=\"Editage Insights\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Editage\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-03T16:23:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-15T06:29:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2020\/07\/TUSCE_62_3_TUSCE_62_small-thumbnail.JPG\" \/>\n\t<meta property=\"og:image:width\" content=\"656\" \/>\n\t<meta property=\"og:image:height\" content=\"277\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Impact Science\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Editage\" \/>\n<meta name=\"twitter:site\" content=\"@Editage\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Impact Science\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems\"},\"author\":{\"name\":\"Impact Science\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/cbcaf87b3854025dbc992cc0df30714d\"},\"headline\":\"Researchers develop cryptographic scheme to protect personal information in single sign-on systems\",\"datePublished\":\"2020-07-03T16:23:08+00:00\",\"dateModified\":\"2025-01-15T06:29:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems\"},\"wordCount\":988,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"keywords\":[\"Science Update\"],\"articleSection\":[\"Trending Research\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems\",\"url\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems\",\"name\":\"Researchers develop cryptographic scheme to protect personal information in single sign-on systems | Editage Insights\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"datePublished\":\"2020-07-03T16:23:08+00:00\",\"dateModified\":\"2025-01-15T06:29:47+00:00\",\"description\":\"Researchers at Tokyo University of Science develop cryptographic scheme to protect personal information in single sign-on systems\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#primaryimage\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"width\":656,\"height\":336},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editage.com\/insights\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Researchers develop cryptographic scheme to protect personal information in single sign-on systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editage.com\/insights\/#website\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"name\":\"Editage Insights\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editage.com\/insights\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\",\"name\":\"Editage Insights\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"width\":2560,\"height\":324,\"caption\":\"Editage Insights\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Editage\",\"https:\/\/x.com\/Editage\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/cbcaf87b3854025dbc992cc0df30714d\",\"name\":\"Impact Science\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6b2b71ce8a6c1056a3435be210d1bd34462c1c442ee7ce9c426896ad8ccd0763?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6b2b71ce8a6c1056a3435be210d1bd34462c1c442ee7ce9c426896ad8ccd0763?s=96&d=mm&r=g\",\"caption\":\"Impact Science\"},\"url\":\"https:\/\/www.editage.com\/insights\/editage-research-communication\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researchers develop cryptographic scheme to protect personal information in single sign-on systems | Editage Insights","description":"Researchers at Tokyo University of Science develop cryptographic scheme to protect personal information in single sign-on systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems","og_locale":"en_US","og_type":"article","og_title":"Researchers develop cryptographic scheme to protect personal information in single sign-on systems | Editage Insights","og_description":"Researchers at Tokyo University of Science develop cryptographic scheme to protect personal information in single sign-on systems","og_url":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems","og_site_name":"Editage Insights","article_publisher":"https:\/\/www.facebook.com\/Editage","article_published_time":"2020-07-03T16:23:08+00:00","article_modified_time":"2025-01-15T06:29:47+00:00","og_image":[{"width":656,"height":277,"url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2020\/07\/TUSCE_62_3_TUSCE_62_small-thumbnail.JPG","type":"image\/jpeg"}],"author":"Impact Science","twitter_card":"summary_large_image","twitter_creator":"@Editage","twitter_site":"@Editage","twitter_misc":{"Written by":"Impact Science","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#article","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems"},"author":{"name":"Impact Science","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/cbcaf87b3854025dbc992cc0df30714d"},"headline":"Researchers develop cryptographic scheme to protect personal information in single sign-on systems","datePublished":"2020-07-03T16:23:08+00:00","dateModified":"2025-01-15T06:29:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems"},"wordCount":988,"commentCount":0,"publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"image":{"@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","keywords":["Science Update"],"articleSection":["Trending Research"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems","url":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems","name":"Researchers develop cryptographic scheme to protect personal information in single sign-on systems | Editage Insights","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#primaryimage"},"image":{"@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","datePublished":"2020-07-03T16:23:08+00:00","dateModified":"2025-01-15T06:29:47+00:00","description":"Researchers at Tokyo University of Science develop cryptographic scheme to protect personal information in single sign-on systems","breadcrumb":{"@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#primaryimage","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","width":656,"height":336},{"@type":"BreadcrumbList","@id":"https:\/\/www.editage.com\/insights\/researchers-develop-cryptographic-scheme-to-protect-personal-information-in-single-sign-on-systems#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editage.com\/insights\/"},{"@type":"ListItem","position":2,"name":"Researchers develop cryptographic scheme to protect personal information in single sign-on systems"}]},{"@type":"WebSite","@id":"https:\/\/www.editage.com\/insights\/#website","url":"https:\/\/www.editage.com\/insights\/","name":"Editage Insights","description":"","publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editage.com\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.editage.com\/insights\/#organization","name":"Editage Insights","url":"https:\/\/www.editage.com\/insights\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","width":2560,"height":324,"caption":"Editage Insights"},"image":{"@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Editage","https:\/\/x.com\/Editage"]},{"@type":"Person","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/cbcaf87b3854025dbc992cc0df30714d","name":"Impact Science","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6b2b71ce8a6c1056a3435be210d1bd34462c1c442ee7ce9c426896ad8ccd0763?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b2b71ce8a6c1056a3435be210d1bd34462c1c442ee7ce9c426896ad8ccd0763?s=96&d=mm&r=g","caption":"Impact Science"},"url":"https:\/\/www.editage.com\/insights\/editage-research-communication"}]}},"_links":{"self":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/3535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/users\/1152"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/comments?post=3535"}],"version-history":[{"count":0,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/3535\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media\/33313"}],"wp:attachment":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media?parent=3535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/categories?post=3535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/tags?post=3535"},{"taxonomy":"new_categories","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_categories?post=3535"},{"taxonomy":"new_tags","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_tags?post=3535"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/series?post=3535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}