FINDING · DEFENSE

For a Collage-style system with T forward-security time intervals and k rendezvous-point identities (e.g., k popular Flickr hashtags), standard public-key steganography requires distributing kT public keys, whereas an IBST-based solution requires distributing only 1 master public key. This reduction is exact — the paper states it verbatim as an efficiency argument.

From 2013-ruffing-identity-basedIdentity-Based Steganography and Its Applications to Censorship Resistance · §4.1 Application to Collage · 2013 · Hot Topics in Privacy Enhancing Technologies

Implications

Tags

censors
generic
defenses
steganographytunneling

Extracted by claude-sonnet-4-6 — review before relying.