“…Consequently, the members of group G use K G for accessing the contents published in the group. For instance, PSON [56], Safebook [7], LotusNet [13], Contrail [42], ProofBook [40], SuperNova [14], and Megaphone [53] exploit the symmetric group key to encrypt all the contents shared in a group, i.e., C 0 , C 1 , .....C n .…”