To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key k which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include:
- Introducing and formally defining anonymous steganography,
- A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation),
- A lower bound on the number of bits which are needed to bootstrap anonymous communication.
Category / Keywords: foundations / anonymity Date: received 18 Feb 2015, last revised 27 Feb 2015 Contact author: s k jakobsen at qmul ac uk Available format(s): PDF | BibTeX Citation Version: 20150227:100726 (All versions of this report) Short URL: ia.cr/2015/130 Discussion forum: Show discussion | Start new discussion