Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits.
Radu CiucanuAnatole DelabrouillePascal LafourcadeMarta SoarePublished in: IEEE Trans. Dependable Secur. Comput. (2023)
Keyphrases
- multi armed bandits
- cryptographic protocols
- security protocols
- key distribution
- secure multiparty computation
- multi armed bandit
- authentication protocol
- privacy preserving
- bandit problems
- key agreement protocol
- key exchange
- security properties
- multi party
- security services
- security analysis
- key establishment
- security requirements
- belief functions