FINDING · DEFENSE
The proof-of-censorship scheme uses single-server computational PIR with homomorphic encryption so that the server, having signed both the PIR query hash and its reply, cannot selectively omit responses for a targeted file without returning garbage data. A client detecting the mismatch publishes the upload ticket, signed reply, and query seed as a compact, transferable cryptographic proof of censorship verifiable by any third party holding the server's long-term public key.
From 2018-martiny-proof-of-censorship — Proof-of-Censorship: Enabling centralized censorship-resistant content providers · §4.1 · 2018 · Financial Cryptography and Data Security
Implications
- Centralized content providers can be held accountable for selective removal by requiring them to sign PIR queries and responses at upload time, converting silent censorship into a detectable, transferable cryptographic artifact.
- Design upload protocols so the server commits to a file hash before learning the file's content (e.g., via encrypted upload + URL-embedded decryption key), preventing pre-upload targeted ticket refusal.
Tags
Extracted by claude-sonnet-4-6 — review before relying.