Author:
Huang Jie,Li Yajie,Zhu Kongni,Song Haokun,Zhao Yongli,Zhang Jie
Abstract
This paper analyzes the post-processing security through information entropy and compares three privacy amplification methods for physical layer key generation. Simulation reveals key generation rate and security should be jointly considered when applying privacy amplification.