The IBST construction is provably secure under the bilinear decisional Diffie-Hellman (BDDH) assumption in the random oracle model. Any adversary with advantage ε(λ) against IBST indistinguishability implies an adversary against BDDH with advantage at least ε(λ)/e(1+qE), where qE is the number of private-key extraction queries. Tags produced by the scheme are computationally indistinguishable from uniform random bitstrings for any party lacking the recipient's private key.
From 2013-ruffing-identity-based — Identity-Based Steganography and Its Applications to Censorship Resistance
· §3.2 Construction / Theorem 1
· 2013
· Hot Topics in Privacy Enhancing Technologies
Implications
Use elliptic-curve x-coordinate encoding (quadratic-twist trick from Telex) to ensure steganographic tags are byte-for-byte indistinguishable from uniform random data, defeating entropy-based classifiers.
When threat-modeling a covert-channel tagging scheme, verify that undetectability is provably reduced to a well-studied hardness assumption rather than relying on heuristic entropy arguments.