COMMENT 5 Identity Authentication Based on CPK