Lecture

Secret Key Generation: Polar Coding

Description

This lecture covers the theory and practical implementation of secret key generation using polar coding for short blocklengths. The instructor explains the concept of secret key capacity, key rate-leakage pairs, and key leakage rate. The lecture also delves into the application of polar codes for generating secret keys from correlated Gaussian random variables, highlighting the advantages over other coding techniques. Theoretical bounds for secret key capacity are discussed, along with the protocol steps for generating secret keys. The lecture concludes with simulation results demonstrating the performance of the proposed protocol at short blocklengths.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.