{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How can blockchain technology be applied in the field of digital identity authentication?","a":"Public key and private key: Each user has a public key and a private key. When verifying identity, users only need to use their private key to sign, and verification personnel use the user's public key to verify the signature."}]}],"pr":"1f5b75e9cc30d4c8c852980d6c149787a3c427621661f0933d7f0aa64409e430"}