On the Gold Standard for Security of Universal Steganography

被引:4
作者
Berndt, Sebastian [1 ]
Liskiewicz, Maciej [2 ]
机构
[1] Univ Kiel, Dept Comp Sci, Kiel, Germany
[2] Univ Lubeck, Inst Theoret Comp Sci, Lubeck, Germany
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I | 2018年 / 10820卷
关键词
PUBLIC-KEY STEGANOGRAPHY; ENCRYPTION;
D O I
10.1007/978-3-319-78381-9_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for publickey steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.
引用
收藏
页码:29 / 60
页数:32
相关论文
共 40 条
[1]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[2]  
[Anonymous], 2017, Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis
[3]   Subversion-Resilient Signature Schemes [J].
Ateniese, Giuseppe ;
Magri, Bernardo ;
Venturi, Daniele .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :364-375
[4]  
Backes M, 2005, LECT NOTES COMPUT SC, V3378, P210
[5]   Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks [J].
Bellare, Mihir ;
Jaeger, Joseph ;
Kane, Daniel .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1431-1440
[6]  
Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1
[7]   Algorithm Substitution Attacks from a Steganographic Perspective [J].
Berndt, Sebastian ;
Liskiewicz, Maciej .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1649-1660
[8]   An information-theoretic model for steganography [J].
Cachin, C .
INFORMATION AND COMPUTATION, 2004, 192 (01) :41-56
[9]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565
[10]   Covert multi-party computation [J].
Chandran, Nishanth ;
Goyal, Vipul ;
Ostrovsky, Rafail ;
Sahai, Arnit .
48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, :238-248