641cdb48e92b513e.tex
1: \begin{abstract}
2: We consider a group of $m+1$ trusted nodes that aim
3: to create a shared secret key $\mc{K}$ over a network in the
4: presence of a passive eavesdropper, Eve. We assume a linear non-coherent 
5: network coding broadcast channel (over a finite field $\Fbb_q$) 
6: from one of the honest nodes (\ie, Alice) to the rest of them including
7: Eve. All of the trusted nodes can also discuss over a cost-free
8: public channel which is also overheard by Eve.
9: 
10: For this setup, we propose upper and lower bounds for the secret key 
11: generation capacity assuming that the field size $q$ is very large. 
12: For the case of two trusted terminals ($m=1$) our upper and lower
13: bounds match and we have complete characterization for the secrecy 
14: capacity in the large field size regime.
15: \end{abstract}
16: