FINDING · DEFENSE

The proof-of-censorship scheme uses single-server computational PIR with homomorphic encryption so that the server, having signed both the PIR query hash and its reply, cannot selectively omit responses for a targeted file without returning garbage data. A client detecting the mismatch publishes the upload ticket, signed reply, and query seed as a compact, transferable cryptographic proof of censorship verifiable by any third party holding the server's long-term public key.

From 2018-martiny-proof-of-censorshipProof-of-Censorship: Enabling centralized censorship-resistant content providers · §4.1 · 2018 · Financial Cryptography and Data Security

Implications

Tags

censors
generic
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.