This is why I say fraud proof could be a DOS attack vector.
The fraud proof itself can't be used as a DOS attack. Fraud proofs are self-proving. You just need the header chain + fraud proof to verify that it is a valid fraud proof and then you can forward it.
Only the first fraud proof for a given block should be forwarded as that causes the block to be blacklisted.
The only DOS attack is claims that data is missing.
We can solve this by a soft fork:
1. Redefine OP_NOP9 as OP_FRAUDPROOF
2. A validator will deposit some bitcoins to this scriptPubKey: OP_FRAUDPROOF OP_2DROP (The OP_2DROP is needed for complying with BIP62)
3. The validator can always get his money back any time with this scriptSig: OP_0 . In this case, the "validator's sig" is same as a signature for OP_CHECKSIG
4. The bitcoins can also be spent by anyone, if the validator signs a fraudproof. The scriptSig will be . However, this scripSig is valid only in the descendants of block X.
5. If the block X is invalid, the validator will lose nothing because the descendants of X won't be valid anyway.
6. If the block X is valid, someone (most likely a miner) will collect the bitcoin and the blockchain goes on.
The only claim required is "transaction X in block Y is missing". I don't really see how this helps with that.
Validators could honestly not realise that the data is available.
Problems:
1. Why would a voluntary validator agree to lock his bitcoin this way, just for charity?
2. Validator has to keep the private key in a hot wallet
3. When there is a hardfork, non-upgrading validators will lose money.
Maybe, validators could get a share of the fees somehow.
The fundamental problem is ensuring that a majority of miners are willing to broadcast their blocks quickly. I think proof of publication would be helpful here. Under proof of publication, blocks are just lists of byte arrays. This is easy to verify, so may reduce the centralisation pressure.
Proof of publication combined with something like p2pool might be enough to ensure that data isn't withheld. Once all nodes have consistent access to block data, fraud proofs can handle everything else.