On the gold standard for security of universal steganography
From MaRDI portal
(Redirected from Publication:1648780)
Abstract: While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.
Recommendations
Cites work
- scientific article; zbMATH DE number 1303133 (Why is no real title available?)
- scientific article; zbMATH DE number 1942414 (Why is no real title available?)
- scientific article; zbMATH DE number 2009959 (Why is no real title available?)
- A Comparative Review of Component Tree Computation Algorithms
- A more cautious approach to security against mass surveillance
- A one-time stegosystem and applications to efficient covert communication
- Adaptive trapdoor functions and chosen-ciphertext security
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- An information-theoretic model for steganography
- Automata, Languages and Programming
- Broadcast steganography
- Connected morphological attribute filters on distributed memory parallel machines
- Constructing perfect steganographic systems
- Domain specific high-level constraints for user interface layout
- Efficiency of a Good But Not Linear Set Union Algorithm
- Efficient Concurrent Covert Computation of String Equality and Set Intersection
- Enhancements of trapdoor permutations
- Grey-box steganography
- Hyperconnectivity, Attribute-Space Connectivity and Path Openings: Theoretical Relationships
- Inf-structuring functions: a unifying theory of connections and connected operators
- Introduction to modern cryptography
- New directions in cryptography
- Nonmalleable Cryptography
- Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
- Probability and Computing
- Provably Secure Steganography
- Public Key Cryptography - PKC 2006
- Salembier's min-tree algorithm turned into breadth first search
- Security of symmetric encryption against mass surveillance
- Standard security does not imply indistinguishability under selective opening
- Theory of Cryptography
- Tiling algebra for constraint-based layout editing
- Upper and lower bounds on black-box steganography
- Viscous-hyperconnected attribute filters: a first algorithm
Cited in
(6)- Theory of Cryptography
- Advances in Cryptology - EUROCRYPT 2004
- On the universal steganography of optimal rate
- The Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its application
- Automata, Languages and Programming
- CCA security and trapdoor functions via key-dependent-message security
This page was built for publication: On the gold standard for security of universal steganography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648780)