I. Introduction
Due to the rapid expansion of mobile devices and network services in fifth-generation (5G) and sixth-generation (6G) networks, Multi-Access Edge Computing (MEC) networks face a significant challenge in catering to the dynamic requirements of mobile users and ensuring the protection of their privacy [1]. This challenge is further compounded by the growing concern among users regarding the potential compromise of their personal information, thus necessitating the prioritization of privacy protection [2]. Consequently, there is an urgent need to improve the processing speed of users' computing tasks, assist them in offloading computing tasks and allocating resources at the edge, and effectively safeguard their privacy [2].