{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How to generate identity key pairs for validation nodes?","a":"The process of generating identity key pairs for validation nodes is as follows:\\n\\n1. First, choose an encryption algorithm, such as the Elliptic Curve Cryptography (ECC) or RSA algorithm. Both algorithms can be used to generate public and private keys.\\n\\n2. For Elliptic Curve Cryptography (ECC), the process of generating identity key pairs is as follows:\\n\\n a. Choose an elliptic curve equation. Points on the elliptic curve have a fixed number, which is called the order of the elliptic curve.\\n\\n b. Generate a random number as the private key, with a range between 1 and the order of the elliptic curve.\\n\\n c. Compute the public key by applying a specific mathematical operation to the private key and the elliptic curve equation.\\n\\n3. The public key is then used to validate transactions on the"}]}],"pr":"848e1cc88e0e0fb929bb99b331de71c43d9b89a1d20c2ecf6fbc7cd55c3aa8e5"}