Digital evidence can be encrypted during a forensic investigation to ensure privacy, so what other type of operation can be performed on the encrypted digital evidence apart from keyword search?
I do not know how to give you a answer that incorporates all the solutions to your problem. However, in the article below (particularly the authors referenced) you will find people who are also working this or similar problems.