Abstract
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are especially motivated by problem classes that appear to be difficult for computers to solve effectively, but are easier for humans; e.g., image analysis, speech recognition, and natural language processing. This paradigm already seems to be employed in several real-world scenarios, but we are unaware of any formal and unified attempt to study it. Nonetheless, this concept spawns interesting research questions in cryptography, algorithm design, human computer interfaces, and programming language / API design, among other fields. There are also interesting implications for Internet commerce and the B24b model. We describe this general research area at a high level and touch upon some preliminary work; a more extensive treatment can be found in [6].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Communications of the ACM 47(2), 56–60 (2004)
von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, Springer, Heidelberg (2003)
von Ahn, L., Dabbish, L.: Labeling Images with a Computer Game. In: ACM CHI 2004 (2004), See also http://www.espgame.org/
Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103–118. Springer, Heidelberg (1997)
Drèze, X., Hussherr, F.: Internet Advertising: Is Anybody Watching? Journal of Interactive Marketing 17(4), 8–23 (2003)
Gentry, C., Ramzan, Z., Stubblebine, S.: Secure Distributed Human Computation. In: Proc. ACM Conference on Electronic Commerce (2005)
Goldreich, O.: Foundations of Cryptography – Volume 2. Cambridge University Press, Cambridge (2004)
Golle, P., Mironov, I.: Uncheatable Distributed Computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, p. 425. Springer, Heidelberg (2001)
Golle, P., Stubblebine, S.: Distributed computing with payout: task assignment for financial- and strong- security. In: Financial Cryptography 2001 (2001)
Prahalad, C.K., Hart, S.: The Fortune at the Bottom of the Pyramid. Strategy + Business (26), Q1 (2000)
Spam Net Web Site, http://www.cloudmark.com
Vipul’s Razor Web Site, http://sourceforge.net/projects/razor
Zhou, F., Zhuang, L., Zhao, B., Huang, L., Joseph, A.D., Kubiatowicz, J.: Approximate Object Location and Spam Filtering. ACM Middleware (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gentry, C., Ramzan, Z., Stubblebine, S. (2005). Secure Distributed Human Computation. In: Patrick, A.S., Yung, M. (eds) Financial Cryptography and Data Security. FC 2005. Lecture Notes in Computer Science, vol 3570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11507840_28
Download citation
DOI: https://doi.org/10.1007/11507840_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26656-3
Online ISBN: 978-3-540-31680-0
eBook Packages: Computer ScienceComputer Science (R0)