Censorship Resistance Revisited. Perng, G., Reiter, M. K., & Wang, C. June 2005. Paper doi abstract bibtex \textquotedblleftCensorship resistant\textquotedblright systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation of censorship resistance (CR) that is resistant to selective filtering even by a censor who is able to inspect (but not alter) the internal contents and computations of each data server, excluding only the server\textquoterights private signature key. This models a service provided by operators who do not hide their identities from censors. Even with such a strong adversarial model, our definition states that CR is only achieved if the censor must disable the entire system to filter selected content. We show that existing censorship resistant systems fail to meet this definition; that Private Information Retrieval (PIR) is necessary, though not sufficient, to achieve our definition of CR; and that CR is achieved through a modification of PIR for which known implementations exist.
@conference {ih05-csispir,
title = {Censorship Resistance Revisited},
booktitle = {Proceedings of Information Hiding Workshop (IH 2005)},
year = {2005},
month = {June},
pages = {62{\textendash}76},
publisher = {Springer Berlin / Heidelberg},
organization = {Springer Berlin / Heidelberg},
abstract = {{\textquotedblleft}Censorship resistant{\textquotedblright} systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation of censorship resistance (CR) that is resistant to selective filtering even by a censor who is able to inspect (but not alter) the internal contents and computations of each data server, excluding only the server{\textquoteright}s private signature key. This models a service provided by operators who do not hide their identities from censors. Even with such a strong adversarial model, our definition states that CR is only achieved if the censor must disable the entire system to filter selected content. We show that existing censorship resistant systems fail to meet this definition; that Private Information Retrieval (PIR) is necessary, though not sufficient, to achieve our definition of CR; and that CR is achieved through a modification of PIR for which known implementations exist.},
keywords = {censorship resistance, private information retrieval},
isbn = {978-3-540-29039-1},
doi = {10.1007/11558859},
url = {http://www.springerlink.com/content/f08707qw34614340/},
author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}
}
Downloads: 0
{"_id":"7KRgqNvhc4kx2W2dF","bibbaseid":"perng-reiter-wang-censorshipresistancerevisited-2005","downloads":0,"creationDate":"2018-07-03T04:50:28.600Z","title":"Censorship Resistance Revisited","author_short":["Perng, G.","Reiter, M. K.","Wang, C."],"year":2005,"bibtype":"conference","biburl":"https://gnunet.org/bibliography/export/bibtex","bibdata":{"bibtype":"conference","type":"conference","title":"Censorship Resistance Revisited","booktitle":"Proceedings of Information Hiding Workshop (IH 2005)","year":"2005","month":"June","pages":"62\\textendash76","publisher":"Springer Berlin / Heidelberg","organization":"Springer Berlin / Heidelberg","abstract":"\\textquotedblleftCensorship resistant\\textquotedblright systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation of censorship resistance (CR) that is resistant to selective filtering even by a censor who is able to inspect (but not alter) the internal contents and computations of each data server, excluding only the server\\textquoterights private signature key. This models a service provided by operators who do not hide their identities from censors. Even with such a strong adversarial model, our definition states that CR is only achieved if the censor must disable the entire system to filter selected content. We show that existing censorship resistant systems fail to meet this definition; that Private Information Retrieval (PIR) is necessary, though not sufficient, to achieve our definition of CR; and that CR is achieved through a modification of PIR for which known implementations exist.","keywords":"censorship resistance, private information retrieval","isbn":"978-3-540-29039-1","doi":"10.1007/11558859","url":"http://www.springerlink.com/content/f08707qw34614340/","author":[{"firstnames":["Ginger"],"propositions":[],"lastnames":["Perng"],"suffixes":[]},{"firstnames":["Michael","K."],"propositions":[],"lastnames":["Reiter"],"suffixes":[]},{"firstnames":["Chenxi"],"propositions":[],"lastnames":["Wang"],"suffixes":[]}],"bibtex":"@conference {ih05-csispir,\n\ttitle = {Censorship Resistance Revisited},\n\tbooktitle = {Proceedings of Information Hiding Workshop (IH 2005)},\n\tyear = {2005},\n\tmonth = {June},\n\tpages = {62{\\textendash}76},\n\tpublisher = {Springer Berlin / Heidelberg},\n\torganization = {Springer Berlin / Heidelberg},\n\tabstract = {{\\textquotedblleft}Censorship resistant{\\textquotedblright} systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation of censorship resistance (CR) that is resistant to selective filtering even by a censor who is able to inspect (but not alter) the internal contents and computations of each data server, excluding only the server{\\textquoteright}s private signature key. This models a service provided by operators who do not hide their identities from censors. Even with such a strong adversarial model, our definition states that CR is only achieved if the censor must disable the entire system to filter selected content. We show that existing censorship resistant systems fail to meet this definition; that Private Information Retrieval (PIR) is necessary, though not sufficient, to achieve our definition of CR; and that CR is achieved through a modification of PIR for which known implementations exist.},\n\tkeywords = {censorship resistance, private information retrieval},\n\tisbn = {978-3-540-29039-1},\n\tdoi = {10.1007/11558859},\n\turl = {http://www.springerlink.com/content/f08707qw34614340/},\n\tauthor = {Ginger Perng and Michael K. Reiter and Chenxi Wang}\n}\n","author_short":["Perng, G.","Reiter, M. K.","Wang, C."],"key":"ih05-csispir","id":"ih05-csispir","bibbaseid":"perng-reiter-wang-censorshipresistancerevisited-2005","role":"author","urls":{"Paper":"http://www.springerlink.com/content/f08707qw34614340/"},"keyword":["censorship resistance","private information retrieval"],"downloads":0},"search_terms":["censorship","resistance","revisited","perng","reiter","wang"],"keywords":["censorship resistance","private information retrieval"],"authorIDs":[],"dataSources":["FWsPTwsmjtrBtRS3B"]}