Use cases and Restrictions of using Information Centric Encryption (ICE)