Understanding the Identity-Transformation Approach in OIDC-Compatible Privacy-Preserving SSO Services

📅 2025-06-02
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses critical security flaws in identity transformation mechanisms within OIDC-compliant privacy-preserving single sign-on (SSO), which enable IdP login tracking and cross-RP identity linkage. We establish, for the first time, a rigorous theoretical connection between identity transformation and oblivious pseudorandom functions (OPRFs). To formally capture SSO-specific privacy requirements, we propose a dedicated security model defining three core properties: key-identifier independence, RP specificity, and user identifiability. Based on this model, we construct the first OPRF-based identity transformation scheme and systematically characterize the OPRF variant requirements tailored to SSO. We formally verify that several existing OPRF protocols satisfy our model, thereby providing both a sound theoretical foundation and a practical, implementable paradigm for privacy-enhancing OIDC deployments.

Technology Category

Application Category

📝 Abstract
OpenID Connect (OIDC) enables a user with commercial-off-the-shelf browsers to log into multiple websites, called relying parties (RPs), by her username and credential set up in another trusted web system, called the identity provider (IdP). Identity transformations are proposed in UppreSSO to provide OIDC-compatible SSO services, preventing both IdP-based login tracing and RP-based identity linkage. While security and privacy of SSO services in UppreSSO have been proved, several essential issues of this identity-transformation approach are not well studied. In this paper, we comprehensively investigate the approach as below. Firstly, several suggestions for the efficient integration of identity transformations in OIDC-compatible SSO are explained. Then, we uncover the relationship between identity-transformations in SSO and oblivious pseudo-random functions (OPRFs), and present two variations of the properties required for SSO security as well as the privacy requirements, to analyze existing OPRF protocols. Finally, new identity transformations different from those designed in UppreSSO, are constructed based on OPRFs, satisfying different variations of SSO security requirements. To the best of our knowledge, this is the first time to uncover the relationship between identity transformations in OIDC-compatible privacy-preserving SSO services and OPRFs, and prove the SSO-related properties (i.e., key-identifier freeness, RP designation and user identification) of OPRF protocols, in addition to the basic properties of correctness, obliviousness and pseudo-randomness.
Problem

Research questions and friction points this paper is trying to address.

Investigates identity-transformation in OIDC-compatible privacy-preserving SSO
Analyzes relationship between SSO identity-transformations and OPRFs
Constructs new identity transformations meeting varied SSO security needs
Innovation

Methods, ideas, or system contributions that make the work stand out.

Uses identity transformations for OIDC-compatible SSO
Links identity transformations to OPRFs
Constructs new OPRF-based identity transformations
🔎 Similar Papers
No similar papers found.
Jingqiang Lin
Jingqiang Lin
Professor, University of Science and Technology of China
system securitycryptography
B
Baitao Zhang
School of Cyber Security, University of Science and Technology of China
W
Wei Wang
School of Cyber Security, University of Science and Technology of China
Quanwei Cai
Quanwei Cai
University of Science and Technology of China
Applied CryptographyPET
J
Jiwu Jing
School of Cryptology, University of Chinese Academy of Sciences
H
Huiyang He
School of Cyber Security, University of Science and Technology of China