FINDING · DEFENSE
A dynamic binary-tree partitioning algorithm solves the proxy distribution problem with at most k(1 + ⌈log₂(n/k)⌉) total proxy keys: partition n users into k groups in round 1, then halve each compromised group on each compromise event. Each of k adversaries can trigger at most ⌈log₂(n/k)⌉ compromises, bounding total proxy expenditure tightly.
From 2010-mahdian-fighting — Fighting Censorship with Algorithms · §4 Theorem 3 · 2010 · International Conference on Fun with Algorithms
Implications
- Implement adaptive bridge re-issuance as a binary bisection: when a bridge is burned, split its user cohort and issue each half a distinct new bridge — this contains adversary leverage to logarithmic depth regardless of cohort size.
- For a deployment with n=10,000 users and k=10 suspected informants, this scheme caps total proxy burn at roughly 10 × 14 = 140 bridges, making adaptive distribution operationally feasible.
Tags
Extracted by claude-sonnet-4-6 — review before relying.