2 Questions 2 Answers 0 Followers
Questions related from Henri Ruotsalainen
Background: Alice and Bob collect N wireless channel measurements, quantize secret bits out of them, correct for errors and perform privacy amplification to reduce the eavesdropper information...
04 September 2019 8,409 3 View
Given that: 1) Alice and Bob have access to a common source of randomness, 2) Bobs random values are displaced by some (nonlinear) function, i.e. B_rand = F(A_rand). Are there protocols, which...
16 October 2018 1,797 5 View