On the Gold Standard for Security of Universal Steganography

被引:4
作者
Berndt, Sebastian [1 ]
Liskiewicz, Maciej [2 ]
机构
[1] Univ Kiel, Dept Comp Sci, Kiel, Germany
[2] Univ Lubeck, Inst Theoret Comp Sci, Lubeck, Germany
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I | 2018年 / 10820卷
关键词
PUBLIC-KEY STEGANOGRAPHY; ENCRYPTION;
D O I
10.1007/978-3-319-78381-9_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for publickey steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.
引用
收藏
页码:29 / 60
页数:32
相关论文
共 40 条
[31]  
LUBY M, 1986, LECT NOTES COMPUT SC, V218, P447
[32]  
Lysyanskaya A, 2006, LECT NOTES COMPUT SC, V3958, P123
[33]  
Naor M., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P33, DOI 10.1145/73007.73011
[34]   Decoy Password Vaults: At Least as Hard as Steganography? [J].
Pasquini, Cecilia ;
Schoettle, Pascal ;
Boehme, Rainer .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 :356-370
[35]   Constructing perfect steganographic systems [J].
Ryabko, Boris ;
Ryabko, Daniil .
INFORMATION AND COMPUTATION, 2011, 209 (09) :1223-1230
[36]  
Simon DR, 1998, LECT NOTES COMPUT SC, V1403, P334, DOI 10.1007/BFb0054137
[37]  
Van Le T, 2007, LECT NOTES COMPUT SC, V4437, P297
[38]  
von Ahn L, 2004, LECT NOTES COMPUT SC, V3027, P323
[39]  
von Ahn L., 2003, IACR CRYPTOLOGY EPRI, V2003/233
[40]   Perfectly secure steganogranphy: Capacity, error exponents, and code constructions [J].
Wang, Ying ;
Moulin, Pierre .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2706-2722