US 9,813,903 B2
Method for communicating in a network, a communication device and a system therefor
Martijn Maas, Eindhoven (NL); and Oscar Garcia Morchon, Eindhoven (NL)
Assigned to KONINKLIJKE PHILIPS N.V., Eindhoven (NL)
Appl. No. 13/63,216
Filed by Martijn Maas, Eindhoven (NL); and Oscar Garcia Morchon, Eindhoven (NL)
PCT Filed Sep. 8, 2009, PCT No. PCT/IB2009/053918
§ 371(c)(1), (2), (4) Date Mar. 10, 2011,
PCT Pub. No. WO2010/032158, PCT Pub. Date Mar. 25, 2010.
Claims priority of application No. 08305561 (EP), filed on Sep. 17, 2008.
Prior Publication US 2011/0164750 A1, Jul. 7, 2011
Int. Cl. H04K 1/00 (2006.01); H04W 12/04 (2009.01); H04L 29/06 (2006.01); H04W 84/18 (2009.01)
CPC H04W 12/04 (2013.01) [H04L 63/061 (2013.01); H04L 63/0435 (2013.01); H04W 84/18 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A method of operating a first node for communicating in a network with a second node, the method comprising the acts of:
in a first node:
a receiver configured to receive from a second node, a second node identifier,
a controller configured to:
determine from the second node identifier, a position of a cryptographic element in a first logical list of cryptographic elements associated with the first node, wherein the position identifies a cryptographic element having a common root with a cryptographic element among a plurality of cryptographic elements of a second logical list associated with the second node, the determination comprising:
computing a second node block identifier as:
j2=i2mod(n2+n+1),
where j2 is the block identifier of the second node,
i2 the second node identifier, and
n is the order of a Finite Projective Plane;
computing a first block identifier of the first node as:
j1=i1mod(n2+n+1),
where j1 is the block identifier, and
i1 the first node identifier,
wherein if the second node block identifier equals the first block identifier, the position of the cryptographic element in the first logical list is dependent on:

OG Complex Work Unit Drawing
 and
if the second node block identifier does not equal the first block identifier, the position of the cryptographic element in the first logical list is dependent on:

OG Complex Work Unit Drawing
where a2 equals floor(j2/n) and a1 equals floor (j1/n), and
generating an encryption key by means of the cryptographic element having the common root and the second node identifier.