Research Article
NSSIA: A New Self-Sovereign Identity Scheme with Accountability
Table 1
Notations used in our scheme.
| Notations | Description |
| | Master key | | Public key of entity | | Secret key of entity | | Subkey of entity | | Encrypted subkey of entity | | The number of secure storages is and the corresponding threshold is | | The number of regulatory authorities is and the corresponding threshold is | | XOR operation of and | | Hash operation on | | Use to encrypt | | Use to decrypt | | Use to sign | | Use to verify | | Encrypted identity information |
|
|