Skip to main navigation Skip to search Skip to main content

Secure Best Arm Identification in the Presence of a Copycat

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Consider the problem of best arm identification with a security constraint. Specifically, assume a setup of stochastic linear bandits with K arms of dimension d. In each arm pull, the player receives a reward that is the sum of the dot product of the arm with an unknown parameter vector and independent noise. The player's goal is to identify the best arm after T arm pulls. Moreover, assume a copycat Chloe is observing the arm pulls. The player wishes to keep Chloe ignorant of the best arm.While a minimax-optimal algorithm identifies the best arm with an Ω (T/log(d)) error exponent, it easily reveals its best-arm estimate to an outside observer, as the best arms are played more frequently. A naïve secure algorithm that plays all arms equally results in an Ω (T/d) exponent. In this paper, we propose a secure algorithm that plays with coded arms. The algorithm does not require any key or cryptographic primitives, yet achieves an Ω (T/log2(d)) exponent while revealing almost no information on the best arm.

Original languageEnglish
Title of host publication2025 IEEE Information Theory Workshop, ITW 2025
PublisherInstitute of Electrical and Electronics Engineers
ISBN (Electronic)9798331531423
DOIs
StatePublished - 1 Jan 2025
Event2025 IEEE Information Theory Workshop, ITW 2025 - Sydney, Australia
Duration: 29 Sep 20253 Oct 2025

Publication series

Name2025 IEEE Information Theory Workshop, ITW 2025

Conference

Conference2025 IEEE Information Theory Workshop, ITW 2025
Country/TerritoryAustralia
CitySydney
Period29/09/253/10/25

Keywords

  • Best Arm Identification
  • Coded Best Arm Identification
  • Linear Stochastic Bandits
  • Security

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Information Systems
  • Signal Processing
  • Theoretical Computer Science

Fingerprint

Dive into the research topics of 'Secure Best Arm Identification in the Presence of a Copycat'. Together they form a unique fingerprint.

Cite this