Skip to main content

Secure Distributed Human Computation

  • Conference paper
Book cover Financial Cryptography and Data Security (FC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3570))

Included in the following conference series:

Abstract

We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are especially motivated by problem classes that appear to be difficult for computers to solve effectively, but are easier for humans; e.g., image analysis, speech recognition, and natural language processing. This paradigm already seems to be employed in several real-world scenarios, but we are unaware of any formal and unified attempt to study it. Nonetheless, this concept spawns interesting research questions in cryptography, algorithm design, human computer interfaces, and programming language / API design, among other fields. There are also interesting implications for Internet commerce and the B24b model. We describe this general research area at a high level and touch upon some preliminary work; a more extensive treatment can be found in [6].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Communications of the ACM 47(2), 56–60 (2004)

    Article  Google Scholar 

  2. von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. von Ahn, L., Dabbish, L.: Labeling Images with a Computer Game. In: ACM CHI 2004 (2004), See also http://www.espgame.org/

  4. Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)

    Google Scholar 

  5. Drèze, X., Hussherr, F.: Internet Advertising: Is Anybody Watching? Journal of Interactive Marketing 17(4), 8–23 (2003)

    Article  Google Scholar 

  6. Gentry, C., Ramzan, Z., Stubblebine, S.: Secure Distributed Human Computation. In: Proc. ACM Conference on Electronic Commerce (2005)

    Google Scholar 

  7. Goldreich, O.: Foundations of Cryptography – Volume 2. Cambridge University Press, Cambridge (2004)

    Book  Google Scholar 

  8. Golle, P., Mironov, I.: Uncheatable Distributed Computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, p. 425. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Golle, P., Stubblebine, S.: Distributed computing with payout: task assignment for financial- and strong- security. In: Financial Cryptography 2001 (2001)

    Google Scholar 

  10. Prahalad, C.K., Hart, S.: The Fortune at the Bottom of the Pyramid. Strategy + Business (26), Q1 (2000)

    Google Scholar 

  11. Spam Net Web Site, http://www.cloudmark.com

  12. Vipul’s Razor Web Site, http://sourceforge.net/projects/razor

  13. Zhou, F., Zhuang, L., Zhao, B., Huang, L., Joseph, A.D., Kubiatowicz, J.: Approximate Object Location and Spam Filtering. ACM Middleware (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gentry, C., Ramzan, Z., Stubblebine, S. (2005). Secure Distributed Human Computation. In: Patrick, A.S., Yung, M. (eds) Financial Cryptography and Data Security. FC 2005. Lecture Notes in Computer Science, vol 3570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11507840_28

Download citation

  • DOI: https://doi.org/10.1007/11507840_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26656-3

  • Online ISBN: 978-3-540-31680-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics