You can easily prove that your nsec signed your event within the system.

But you only prove that your nsec is controlled by you via a proof that is outside the system.