Research Article

NSSIA: A New Self-Sovereign Identity Scheme with Accountability

Table 4

Computation cost comparison.

SchemeGeneration cost (ms)Accountability cost (ms)

[17]
[22]
[23]
[26]
[28]
Ours

a is the PBKDF2 algorithm and the computation cost is 40.18 ms when the parameter size is 8 B and the number of rounds is 61337; indicates the SHA-256 operation, and the computation cost is 0.035 ms when the parameter size is 32 B; denotes the AES-256 encryption/decryption algorithm. and are the computation cost of performing the AES-256 encryption/decryption algorithm when the parameter sizes are 64 B and 128 B, respectively, and they are 0.187 ms and 0.1921 ms. b denotes the time complexity of zero-knowledge proof. According to the definition of identity information in our scheme, we refer to the performance simulation of [22], and the value of is 18271.9 ms. c serves as the base58 encoding algorithm and the computation cost is 0.086 ms when the parameter size is 256 B; expresses the RSA signature algorithm and the computation cost is 3.002 ms when the parameter size is 450 B. d, , and indicates the time complexity of an oracle, zero-knowledge proof, and secure multiparty computation, respectively. According to the definition of identity information in our scheme, we refer to the performance simulation of [28], and the value of , , and are 1400 ms, 950 ms, and 1501540 ms, respectively.