Abstract
This paper analyzes the post-processing security through information entropy and compares three privacy amplification methods for physical layer key generation. Simulation reveals key generation rate and security should be jointly considered when applying privacy amplification.
© 2022 The Author(s)
PDF ArticleMore Like This
Ying Cao, Shuhang Chen, Liuming Zhang, Xinran Huang, and Xuelin Yang
SF4L.5 CLEO: Science and Innovations (CLEO:S&I) 2022
Kun Wu, Yuefeng Ji, and Hongxiang Wang
W3B.6 Asia Communications and Photonics Conference (ACP) 2021
Danyang Wang, Hongxiang Wang, and Yuefeng Ji
T4A.236 Asia Communications and Photonics Conference (ACP) 2021