Performance | Zero Trust Arcitectire | Evidence Only Architecture |
Security Principle | Mutual Suspicion → Zero Trust | Evidence sowing and verification |
Authentication Logic | BAN Logic | Truth Logic |
Authentication protocol | SSL (13 steps) | GAP (one step) |
Authentication Method | Trust Transfer | A thing a proof |
Authentication Object | To recognize foe | To recognize friend |
Network Application | Back to Civil-military separation | Can realize Civil-military integration |
Identifier Formation | Identifier was formed in 2021 | Identifier was formed and solved in 2006 |
Private-key generation | Decentralized Generation, no supervision | Centralized generation, allowing supervision |
Public-key generation | Generated from private-key | Computed by a Public matrix |
Identifier Authentication | X | Identifier is authenticated by key |
Subject Authentication | Strong Password + easy CA Certificate | Subject is proven by identifier |
Dynamic Password | None | Authenticated Identifier with time |
Identity Authentication | None | Ontology is proven by identifier |
Slave Authentication | None | Slave is authenticated by Subject |
Object Authentication | Proved by CA Certificate | Object is proved by subject |
DSS Signature Standard | Only establishes trust relation | Identifier is Mapped into key |
Digital Seal | X | For individual or organization |
Recognizer |
| Friend or foe identification, Anti-counterfeit label |
Access Authentication | None | Subject verification |
Adopt Authentication | By certificate | Object verification |
Data Encryption | DES: fixed block encryption | BLK: dynamic block encryption |
Key Encryption | X | Computes other party’s public key to encrypt |
Domain of keys | Unable to define | Defined clearly |
Software trade mark | X | √ |
Software 1st class authorization | Single authorization trusted computing | Software Authorized by manufacturer |
Software 2nd class authorization | None | Software Authorized by clients |
Software 3rd class authorization | None | Software Authorized by individual |
Digital currency issuance | Issued by central bank | Opened by account |
Currency template | None | Issued by commercial bank |
Authorization Letter | None | Authorization letter of Central bank |
Currency flow | None | Payer and payee are indicated |
Currency attribution | None | No vaults or purses needed |
Crime of duplication | Difficult to find | Easy to find |
Function | For payment | For payment and settlement |