IACR News item: 26 February 2015
Sune K. Jakobsen, Claudio Orlandi
ePrint ReportTo solve this problem, we introduce the concept of \\emph{anonymous steganography}: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website (such as cat videos on \\emph{YouTube} or funny memes on \\emph{9GAG}). Then Lea provides Joe with a short key $k$ which, \\emph{when applied to the entire website}, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include:
\\begin{itemize}
\\item Introducing and formally defining \\emph{anonymous steganography},
\\item A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation),
\\item A lower bound on the number of bits which are needed to bootstrap anonymous communication.
\\end{itemize}
Additional news items may be found on the IACR news page.