{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How do digital signatures in blockchain avoid private key leakage?","a":"Encryption Algorithm: The digital signature algorithm used in blockchain is usually asymmetric encryption algorithm, such as Elliptic Curve Digital Signature Algorithm (ECDSA). Asymmetric encryption algorithms have a key pair, including private key and public key. The private key is used for signing, and the public key is used for verifying the signature. Compared with symmetric encryption algorithms, one advantage of asymmetric encryption algorithms is that the private key does not need to be transmitted in the network, reducing the risk of private key leakage."}]}],"pr":"95fce3208754a3902ef01c41780bfb87072899b7d18529e55b5a86de6c904b54"}