Abstract
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem – i.e. one that works on all channels – achieving security against replayable chosen-covertext attacks (ss-rcca) and asked whether security against non-replayable chosen-covertext attacks (ss-cca) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and ss-cca-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper’s problem in a somehow complete manner: As our main positive result we design an ss-cca-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels – where the already sent documents have only marginal influence on the current distribution – and prove that no ss-cca-secure steganography for this family exists in the standard non-look-ahead model.
Original language | English |
---|---|
Title of host publication | EUROCRYPT 2018: Advances in Cryptology – EUROCRYPT 2018 |
Editors | Jesper Buus Nielsen, Vincent Rijmen |
Number of pages | 32 |
Volume | 10820 LNCS |
Publisher | Springer Berlin Heidelberg |
Publication date | 2018 |
Pages | 29-60 |
ISBN (Print) | 978-3-319-78380-2 |
ISBN (Electronic) | 978-3-319-78381-9 |
DOIs | |
Publication status | Published - 2018 |
Event | 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques - Tel Aviv, Israel Duration: 29.04.2018 → 03.05.2018 Conference number: 212999 |