For a Collage-style system with T forward-security time intervals and k rendezvous-point identities (e.g., k popular Flickr hashtags), standard public-key steganography requires distributing kT public keys, whereas an IBST-based solution requires distributing only 1 master public key. This reduction is exact — the paper states it verbatim as an efficiency argument.
From 2013-ruffing-identity-based — Identity-Based Steganography and Its Applications to Censorship Resistance
· §4.1 Application to Collage
· 2013
· Hot Topics in Privacy Enhancing Technologies
Implications
When designing covert-channel rendezvous over user-generated-content platforms (Flickr, Twitter, etc.), prefer identity-based key encapsulation so that adding proxies or rotating time periods does not require distributing additional key material to censored clients.
Limit-test your key-distribution channel to a few hundred bytes; if your scheme requires more per rotation, consider an IBE-based reduction.