Proof of Human Engagement on Decentralized Networks

  • Qifeng ChenEmail author
  • Shiyu ZhangEmail author
  • Wilson WeiEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 881)


We present an approach to proving human engagement on decentralized networks, such as blockchains. Our approach is capable of differentiating real human users from computer bots with high probabilities. In our framework, computer users occasionally need to solve CAPTCHA-like tasks to prove that they are real humans. Our protocol is attack-resistant and prevents computer bots from fetching answers posted by other users during the answer collection period. The consensual answer for a task is defined as the majority vote with stakes weighted. Our experimental simulation on the Steem blockchain shows that the proof-of-human-engagement consensus can be reached with a probability above \(99\%\) when \(15\%\) stake-weighted users are computer bots.


Proof of human engagement Blockchain Decentralized network 


  1. 1.
    von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard AI problems for security. In: EUROCRYPT. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)Google Scholar
  2. 2.
    Google: reCAPTCHA: Easy on humans, hard on bots (2018)Google Scholar
  3. 3.
    Elson, J., Douceur, J.R., Howell, J., Saul, J.: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization. In: ACM Conference on Computer and Communications Security, pp. 366–374. ACM (2007)Google Scholar
  4. 4.
    He, K., Zhang, X., Ren, S., Sun, J.: Delving deep into rectifiers: surpassing human-level performance on imagenet classification. In: ICCV, pp. 1026–1034. IEEE Computer Society (2015)Google Scholar
  5. 5.
    Vicarious: Vicarious AI passes first turing test: Captcha (2013)Google Scholar
  6. 6.
    Blocki, J., Zhou, H.-S.: Designing proof of human-work puzzles for cryptocurrency and beyond. In: Proceedings, Part II of the 14th International Conference on Theory of Cryptography - Volume 9986, pp. 517–546. Springer, New York (2016)CrossRefGoogle Scholar
  7. 7.
    Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, 26–29 October, 2013, Berkeley, CA, USA, pp. 40–49 (2013)Google Scholar
  8. 8.
    Steem: An incentivized, blockchain-based, public content platform (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Lino NetworkCupertinoUSA

Personalised recommendations