FINDING · DEFENSE

The static proxy distribution problem — giving k²-adversarial users keys from m proxies so that all n−k legitimate users retain at least one uncompromised proxy — requires at most O(k² log n) keys and cannot be solved with fewer than Ω(k log(n/k)) keys. This establishes the information-theoretic cost of one-shot proxy distribution against k colluding informants among n users.

From 2010-mahdian-fightingFighting Censorship with Algorithms · §3 Theorem 2 · 2010 · International Conference on Fun with Algorithms

Implications

Tags

censors
cnir
techniques
ip-blocking
defenses
bridgesmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.