{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How are authorized grantors and grantees identified and searched in a blockchain?","a":"Digital Identity Authentication: Through digital identity authentication technologies such as Public Key Infrastructure (PKI) and digital signatures, the identity of grantors and grantees is verified. Grantors generate a pair of public keys and private keys for signing and verifying transactions. Grantees confirm the identity and authorization authenticity of grantors by verifying their digital signatures."}]}],"pr":"16224444b926170107f807d449df598c45f27b9757ed3685b2353863cb52a305"}