{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How does the PHANTOM protocol address the trade-off between security and scalability?","a":"The PHANTOM protocol addresses the trade-off between security and scalability by adopting zero-knowledge proof (ZKP) technology. ZKP enables the prover to demonstrate to the verifier that they know a witness without revealing any information about the witness. This protocol ensures the security of network while achieving scalability. Specifically, the PHANTOM protocol consists of four algorithms: Setup, KeyGen, Prove, and Verify. The Setup algorithm generates system parameters, the KeyGen algorithm generates key pairs, the Prove algorithm is used to prove knowledge of a particular piece of information, and the Verify algorithm is used to verify the proof."}]}],"pr":"41f6afd77ec638c910d63fe9e29a27f19ff8178e6c1b05a12f8d710dfd27be2e"}