Title
Public-Key Steganography
Abstract
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden mes- sages over a public channel so that an adversary cannot even detect that these hidden messages are being sent. Unlike previous settings in which provable security has been applied to steganography, public-key steganography is information-theoretically impossible. In this work we introduce computational security conditions for public-key steganogra- phy similar to those introduced by Hopper, Langford and von Ahn (7) for the private-key setting. We also give the rst protocols for public- key steganography and steganographic key exchange that are provably secure under standard cryptographic assumptions. Additionally, in the random oracle model, we present a protocol that is secure against adver- saries that have access to a decoding oracle (a steganographic analogue of Racko and Simon's attacker-specic adaptive chosen-ciphertext ad- versaries from CRYPTO 91 (10)).
Year
DOI
Venue
2003
10.1007/978-3-540-24676-3_20
IACR Cryptology ePrint Archive
Keywords
Field
DocType
public-key cryptography,provable security,steganography,key exchange,public key cryptography,public key,random oracle model,computer security
Steganography,Steganography tools,Key exchange,Cryptography,Computer science,Computer security,Random oracle,Oracle,Theoretical computer science,Public-key cryptography,Provable security
Journal
Volume
Citations 
PageRank 
2003
26
1.18
References 
Authors
17
2
Name
Order
Citations
PageRank
Luis von Ahn13461346.66
Nicholas Hopper2146995.76