and a destination intend to share secret information over a Gaussian channel in the
presence of a wiretapper who observes the transmission through another Gaussian
channel. Two constraints are imposed on the source-to-destination channel; namely, the
source can transmit only binary phase-shift-keyed (BPSK) symbols, and symbol-by-symbol
hard-decision quantization is applied to the received symbols of the destination. An error …