Return to Article Details A study on searchable encryption schemes Download Download PDF