Return to Article Details Sharing of Data Using Key Aggregation and Searchable Encryption Download Download PDF