1: \begin{abstract}
2: We consider a group of $m+1$ trusted nodes that aim
3: to create a shared secret key $\mc{K}$ over a network in the
4: presence of a passive eavesdropper, Eve. We assume a linear non-coherent
5: network coding broadcast channel (over a finite field $\Fbb_q$)
6: from one of the honest nodes (\ie, Alice) to the rest of them including
7: Eve. All of the trusted nodes can also discuss over a cost-free
8: public channel which is also overheard by Eve.
9:
10: For this setup, we propose upper and lower bounds for the secret key
11: generation capacity assuming that the field size $q$ is very large.
12: For the case of two trusted terminals ($m=1$) our upper and lower
13: bounds match and we have complete characterization for the secrecy
14: capacity in the large field size regime.
15: \end{abstract}
16: