{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How can blockchain technology be applied to digital identity authentication?","a":"Public key and private key: Each user has a public key and a private key. When a user needs to verify their identity, they simply use their private key to sign, and the verifier uses the user's public key to verify the signature."}]}],"pr":"6c2287bf46fb164fd3f3e20ba1676ee346b4f93b9eb8e55b7d79f1642ba463d1"}