EFS uses Alternative Data Streams (ADS), an NTFS feature that some third-party file system drivers have little-if-any support for. Even if the driver supports ADS, no guarantee that it also supports EFS, especially as that would require having somewhere to input the user's key. Each EFS file is encrypted with a unique key, and that key is itself encrypted ("wrapped") with the user keys of every user that has access to the file, and those wrapped keys are stored in ADS of the file; the EFS certs you backed up contain the user key needed to unwrap the file keys.
In theory, there's no reason that you couldn't use an iOS app to decrypt EFS files. First, The app would need to be able to access the hard disk in question (which is not a storage medium that iOS devices usually connect to). Then it would need to know how to access the ADS, how to read the EFS metadata, and how to import the user key (plus you'd need to supply the key and its password). From there, though, EFS uses a well-known (and somewhat outdated by this point) cryptographic cipher suite; an iOS app would have no problems handling it.
I don't know if an app with these capabilities has ever been written. It seems unlikely; iOS is very much not an OS built for this kind of work. Is there some reason you can't just use a Windows (or, next-best, Linux) machine to decrypt the files? On Windows it would be easy (just re-import the cert and user key), and on Linux I'm sure you could find a utility to handle EFS files.