(a) Owner Computation Time upon varying file size
(b) User and Server’s Computation Time upon varying
number of keywords
Figure 2: Time taken for computation.
and 360s with the increase in the size of the database.
For the bad case, when a given keyword is not a
part of the database, the computation time of user
is around 0.02ms but in the case of server, the time
varies between 25ms to 70ms. If the keyword is part
of the database, then with an increase in the number
of keywords, the user time varies between 0.045ms
to 0.1ms, and the server time varies between 0.05ms
and 0.15ms, as shown in Fig.2(b).
We observe that querying existing keywords, the
gas cost is around 23 USD. In Guo et al. (Guo
et al., 2022), the gas cost for uploading a digest in-
creases with the increase in index pairs, varying be-
tween 712.08 USD (gas usage: 9984351, for 1K index
pairs) and 14,252.8388 USD (gas usage:199843506,
for 16K index pairs). In Fidelis, the gas cost for up-
loading data/locking coins is around 46.877 USD (gas
usage: 65727700), being invariant with the frequency
of occurrence of the keyword. The cost of storage
on-chain is fixed (only 320 B) for our protocol, com-
pared to (Guo et al., 2022), where the cost of storage
increases to 1MB when the number of index-pairs is
20K. For non-existing keywords, the smart contract
needs to verify whether the proof sent by server is cor-
rect. The length of the proof increases with the size
of the database, hence the gas cost is much higher.
5 CONCLUSION
We have proposed Fidelis, a blockchain-based search-
able encryption scheme that operates without any
trust assumption and ensures the verifiability of
search results. We provide proof of its security and
fairness. We deploy and test our prototype in the
Ethereum Ropsten testnet with real-life data which
demonstrates the feasibility and efficiency of our pro-
posed scheme. We can see that the protocol can be
executed by all involved parties efficiently.
REFERENCES
Buterin, V. (2020 (accessed November 4, 2020)). Ethereum.
Cash, D., Jarecki, S., Jutla, C. S., Krawczyk, H., Rosu,
M., and Steiner, M. (2013). Highly-scalable search-
able symmetric encryption with support for boolean
queries. In Advances in Cryptology - CRYPTO 2013 -
33rd Annual Cryptology Conf., pp 353–373.
Dahlberg, R., Pulls, T., and Peeters, R. (2016). Efficient
sparse merkle trees - caching strategies and secure
(non-)membership proofs. In Secure IT Systems - 21st
Nordic Conf., NordSec 2016, vol. 10014 of LNCS, pp.
199–215.
Fan, C., Dong, X., Cao, Z., and Shen, J. (2020). VCKSCF:
efficient verifiable conjunctive keyword search based
on cuckoo filter for cloud storage. In, 19th IEEE Int.
Conf. on Trust, Security and Privacy in Computing
and Communications, TrustCom 2020, pp. 285–292.
IEEE.
Guo, Y., Zhang, C., and Jia, X. (2020). Verifiable
and forward-secure encrypted search using blockchain
techniques. In ICC 2020 - 2020 IEEE Int. Conf. on
Communications (ICC), pp. 1–7.
Guo, Y., Zhang, C., Wang, C., and Jia, X. (2022). To-
wards public verifiable and forward-privacy encrypted
search by using blockchain. IEEE Trans. on Depend-
able and Secure Computing, pp. 1–1.
Jiang, S., Liu, J., Wang, L., and Yoo, S. (2019). Verifiable
search meets blockchain: A privacy-preserving frame-
work for outsourced encrypted data. In 2019 IEEE Int.
Conf. on Communications, ICC 2019, pp. 1–6. IEEE.
Li, H., Zhou, H., Huang, H., and Jia, X. (2020). Veri-
fiable encrypted search with forward secure updates
for blockchain-based system. In Wireless Algorithms,
Systems, and Applications - 15th Int. Conf., WASA
2020, vol. 12384, LNCS, pp. 206–217. Springer.
Miao, Y., Tong, Q., Deng, R., Choo, K.-K. R., Liu, X.,
and Li, H. (2022). Verifiable searchable encryption
framework against insider keyword-guessing attack in
cloud storage. IEEE Trans. on Cloud Computing,
10(2):835–848.
Sardar, L. and Ruj, S. (2019). Fspvdsse: A forward secure
publicly verifiable dynamic sse scheme. In Provable
Security - 13th Int. Conf., ProvSec 2019, pp. 355–371.
Wang, J., Chen, X., Sun, S., Liu, J. K., Au, M. H., and
Zhan, Z. (2018). Towards efficient verifiable conjunc-
tive keyword search for large encrypted database. In
Computer Security - 23rd European Symposium on
Research in Computer Security, ESORICS 2018, vol.
11099, LNCS, pp. 83–100. Springer.
Fidelis: Verifiable Keyword Search with No Trust Assumption
703