“…Even NDN packets do not contain any information about the source host where they were originally sent; contents security and privacy are still needed. Different cryptographic approaches have been explored in access control solutions for NDN, such as attribute-based encryption, broadcast encryption [ 32 , 33 ], role-based encryption, identity-based encryption [ 30 , 34 ], proxy re-encryption [ 31 , 35 , 36 ], and so on [ 7 , 37 , 38 ]. These approaches are examined below.…”