The following post contains a proof of concept implemented on Tezos Blockchain.

This is a symbiotic system in which a party injects an asset/a file in a Blockchain as a FA2 NFT (Non Fungible Token). Such NFT contains an IPFS (Interplanetary Filesystem) CID (Content Indentifier – A decentralized data structure) hash, holding a JSON with informations as: digital signature derived from a private key, public key, and a cid hash which was signed.

```
CENSORSHIP RESISTANT PATENT
CID-RSA-NFT digital certification ALGORITHM
```

ipfs.io/ipfs/QmYJm6J2PTqk7g8PUT1rR4TQnr6qD1ZCbZwmy6weTnCWGf

**Tezos Mainnet: KT1M2Gng6zuDEy7PFivXPDYgrNnYEfLsc1z1#16**

Merkle origin: QmXEh8MMNk4waEWXsK9JWoNau4RCRzwPvYdAZc6cZPFhDY

Merkle branches:{“pk”:“QmQD4Aa2BZkVHQmNAG8Bhm3DN3SsTCjZ5Qvy5n577a9FX5”,“sig”:“QmQggb9MgtF8KWL3xPNFBjdDXHx7tCvSAvRYFxRwfqxmJj”,“cid”:“QmYiDxpDPXECmkN5hFqSTafF4Q7uHsGPmHSsYv67gXmMaV”}

```
Public Key:
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2+z4mDNpNmgeQ5b1r8ud0UFQh
BAV1HbnSeosgVyLSm1xI53t8alt3chuB3tk/28Ky6UFcDNxjfsVcOB1Kwp5WUor8
ZcR0ZoyvRs0Ddrvna/lhTOHj8v4lZlVKgDosTSGeFdrsCdpJLf9HPjpFPidWTHnd
6PlbqPwoGKeOu68rLQIDAQAB
Private Key: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```

**Signing**

```
echo -n 'QmYiDxpDPXECmkN5hFqSTafF4Q7uHsGPmHSsYv67gXmMaV' | openssl dgst -sha3-512
(-binary)
echo -n 'd3b861acf4525025f00190f06a58c3bbfa8f08ea2d98b62f77d9be5ba9bf547a2f9fadd64edd5fe8ca1a74977c31285b6b0ed223c3c97e5742f27185fd45ae4e' > hash
```

(sha3 reductant?)

```
openssl dgst -sha256 -sign private.pem -out hash.sig hash
�%��z�2c2�� �#[M��0�X�ᬩ�߇�x�*��!�� ����tp���w��[3Q�7^z�]��a
��p����2��a������$�����ED@�3��������eX�#nM0���eK
00000000 ef bf bd 25 7f ef bf bd ef bf bd 7a ef bf bd 32 |...%.......z...2|
00000010 63 32 ef bf bd ef bf bd 14 09 ef bf bd 23 5b 4d |c2...........#[M|
00000020 ef bf bd ef bf bd 30 ef bf bd 1d 58 ef bf bd e1 |......0....X....|
00000030 ac a9 ef bf bd df 87 ef bf bd 78 1a ef bf bd 2a |..........x....*|
00000040 ef bf bd ef bf bd 21 ef bf bd ef bf bd 10 09 ef |......!.........|
00000050 bf bd ef bf bd ef bf bd ef bf bd 74 70 ef bf bd |...........tp...|
00000060 ef bf bd ef bf bd 77 ef bf bd ef bf bd 5b 33 51 |......w......[3Q|
00000070 ef bf bd 37 5e 7a ef bf bd 5d ef bf bd ef bf bd |...7^z...]......|
00000080 61 0d 0a ef bf bd 7f ef bf bd 70 ef bf bd ef bf |a.........p.....|
00000090 bd ef bf bd ef bf bd 32 ef bf bd ef bf bd 61 ef |.......2......a.|
000000a0 bf bd ef bf bd ef bf bd ef bf bd ef bf bd 11 ef |................|
000000b0 bf bd 24 ef bf bd ef bf bd ef bf bd ef bf bd ef |..$.............|
000000c0 bf bd 45 1b 00 44 7f 40 17 ef bf bd 33 ef bf bd |..E..D.@....3...|
000000d0 0e ef bf bd ef bf bd ef bf bd ef bf bd 08 ef bf |................|
000000e0 bd ef bf bd ef bf bd 65 58 ef bf bd 23 6e 4d 1f |.......eX...#nM.|
000000f0 30 ef bf bd ef bf bd 14 ef bf bd 65 4b |0..........eK|
000000fd
```

**Verification**

```
openssl dgst -sha256 -verify public.pem -signature hash.sig hash
Verified OK
```

I only address those questions here out of respect for *part* of the Tezos Community. This also seems to be an extremely resistant approach to ransomware attacks.