Background: Alice and Bob collect N wireless channel measurements, quantize secret bits out of them, correct for errors and perform privacy amplification to reduce the eavesdropper information to arrive at the final key.
Question: Is there a wireless key agreement technique/protocol like described above, which is provably secure for a finite N?