FINDING · DEFENSE

By reusing keys already held by trusted (non-suspicious) users for ℓ−1 of ℓ subgroups when bisecting the suspicious cohort — issuing only one fresh key per round — the total proxy count drops from O(k log n) to O(k² log n / log log n) in expectation. The information-theoretic lower bound is Ω(k log(n/k) / log(k + log n)), so this bound is tight in n up to a factor of k.

From 2010-mahdian-fightingFighting Censorship with Algorithms · §4 Theorems 4–6 · 2010 · International Conference on Fun with Algorithms

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
bridgesmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.