Paper 2025/1438

Secure Protocols for Best Arm Identification Using Secret Sharing Schemes

Shanuja Sasi
Asaf Cohen
Onur Günlü
Abstract

This paper addresses the challenge of best arm identification in stochastic multi-armed bandit (MAB) models under privacy-preserving constraints, such as in dynamic spectrum access networks where secondary users must privately detect underutilized channels. While previous network security research has explored securing MAB algorithms through techniques such as homomorphic encryption or differential privacy, these methods often suffer from high computational overhead or introduce noise that strictly decreases accuracy. In contrast, this work focuses on lightweight solutions that ensure data confidentiality without compromising the accuracy of best arm identification. We introduce two secure protocols that leverage additive secret sharing and threshold secret sharing. The proposed model, employing aggregation nodes and a comparator node, securely distributes computations to prevent any entity from accessing complete reward or ranking data. Furthermore, the protocol ensures resistance to collusion and fault tolerance, while maintaining computational efficiency. These contributions establish a scalable and robust framework for privacy-preserving best arm identification, offering practical and secure solutions that use MAB methods for network security.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint.
Keywords
Multi-armed banditssecurityreinforcement learning
Contact author(s)
shanuja sasi @ liu se
coasaf @ bgu ac il
onur gunlu @ liu se
History
2025-08-07: approved
2025-08-07: received
See all versions
Short URL
https://ia.cr/2025/1438
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/1438,
      author = {Shanuja Sasi and Asaf Cohen and Onur Günlü},
      title = {Secure Protocols for Best Arm Identification Using Secret Sharing Schemes},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/1438},
      year = {2025},
      url = {https://eprint.iacr.org/2025/1438}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.