FINDING · DEFENSE
The IBST construction is provably secure under the bilinear decisional Diffie-Hellman (BDDH) assumption in the random oracle model. Any adversary with advantage ε(λ) against IBST indistinguishability implies an adversary against BDDH with advantage at least ε(λ)/e(1+qE), where qE is the number of private-key extraction queries. Tags produced by the scheme are computationally indistinguishable from uniform random bitstrings for any party lacking the recipient's private key.
From 2013-ruffing-identity-based — Identity-Based Steganography and Its Applications to Censorship Resistance · §3.2 Construction / Theorem 1 · 2013 · Hot Topics in Privacy Enhancing Technologies
Implications
- Use elliptic-curve x-coordinate encoding (quadratic-twist trick from Telex) to ensure steganographic tags are byte-for-byte indistinguishable from uniform random data, defeating entropy-based classifiers.
- When threat-modeling a covert-channel tagging scheme, verify that undetectability is provably reduced to a well-studied hardness assumption rather than relying on heuristic entropy arguments.
Tags
Extracted by claude-sonnet-4-6 — review before relying.