Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the theory and practical implementation of secret key generation using polar coding for short blocklengths. The instructor explains the concept of secret key capacity, key rate-leakage pairs, and key leakage rate. The lecture also delves into the application of polar codes for generating secret keys from correlated Gaussian random variables, highlighting the advantages over other coding techniques. Theoretical bounds for secret key capacity are discussed, along with the protocol steps for generating secret keys. The lecture concludes with simulation results demonstrating the performance of the proposed protocol at short blocklengths.