“…Asymmetric cryptography based schemes (e.g., CCEF [14], LTE [15], PDF [16], DAEF [17], and ERF [18]) are generally more resilient to adversaries, however, symmetric cryptography based schemes are more efficient in terms of communication overhead, computation overhead, and storage overhead. Therefore, symmetric cryptography based techniques have attracted huge attention, and large amount of work has been done in recent time, such as SEF [19], DEFS [20], GRPEF [21], BECAN [22], GFFS [23], NFFS [23], and DSF [24].…”