FINDING · DEFENSE

The IBST construction is provably secure under the bilinear decisional Diffie-Hellman (BDDH) assumption in the random oracle model. Any adversary with advantage ε(λ) against IBST indistinguishability implies an adversary against BDDH with advantage at least ε(λ)/e(1+qE), where qE is the number of private-key extraction queries. Tags produced by the scheme are computationally indistinguishable from uniform random bitstrings for any party lacking the recipient's private key.

From 2013-ruffing-identity-basedIdentity-Based Steganography and Its Applications to Censorship Resistance · §3.2 Construction / Theorem 1 · 2013 · Hot Topics in Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
random-payload-detectdpi
defenses
steganographyrandomization

Extracted by claude-sonnet-4-6 — review before relying.