FINDING · DEFENSE

A dynamic binary-tree partitioning algorithm solves the proxy distribution problem with at most k(1 + ⌈log₂(n/k)⌉) total proxy keys: partition n users into k groups in round 1, then halve each compromised group on each compromise event. Each of k adversaries can trigger at most ⌈log₂(n/k)⌉ compromises, bounding total proxy expenditure tightly.

From 2010-mahdian-fightingFighting Censorship with Algorithms · §4 Theorem 3 · 2010 · International Conference on Fun with Algorithms

Implications

Tags

censors
cnir
techniques
ip-blocking
defenses
bridgesmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.