Exploration and Practice of the Acquisition Path of Spoken English for Special Purposes with the Blockchain Technology

With the increasing trend of globalization, English, as the most widely used language in the world, has become a subject that many people must learn. English for special purposes is mainly applied to some specialized occupations or English in specic professional skill elds. Due to the increasing national demand for professional compound talents, the status of English for special purposes is also getting higher and higher. However, there are still many problems in the curriculum setting of English for special purposes, for example, outdated teaching mode, lack of oral language skills training, lack of students’ ability to cope with actual situations, weak teaching awareness of teachers, and lack of analysis of students’ needs for English for special purposes, resulting in poor students’ enthusiasm for learning and so on. With the support of blockchain technology, combined with consensus algorithm, hash function algorithm, and smart contract, this paper analyzes English for special purposes, establishes an ESP management system and a corpus of spoken English for special purposes, and analyzes the integrity of the corpus data. e test found that when the number of error data blocks is 10, the total number of damaged data blocks and verication accuracy data blocks is about 4% in order to achieve 99% accuracy. erefore, the integrity of the system is higher when the damage ratio is lower. e system integrity test nds that, with the number of wrong data being larger, when the wrong data block is at 100, 50% of the data blocks of the system integrity are about 1%. e database is complete, which is more helpful for students to study systematically.


Introduction
English for special purposes mainly appeared in British and American countries in the 1960s and later developed in China. With the development of global internationalization, people's demand for professional English knowledge in certain elds has also increased year by year. However, in the process of development, there have been a series of problems such as unsystematic learning of professional English vocabulary, weak listening and speaking ability of students, rigid and traditional teaching methods of English for special purposes, and inadequate analysis of students' needs. Combined with consensus algorithm, hash function algorithm, and smart contract in blockchain, this paper analyzed English for special purposes, established an ESP management system and a corpus of spoken English for special purposes, and analyzed the integrity of the corpus data. After veri cation, the database is completer and more systematic, which e ectively improves the e ciency of students' systematic learning of spoken English for special purposes and establishes a professional vocabulary corpus. It meets the needs of students to learn English for professional use and improves students' self-learning awareness. Blockchain technology provides technical support for students to learn spoken English for special purposes.
Based on blockchain technology, this paper analyzes the de nition, structure, and classi cation of blockchain and establishes an ESP management system. Using the core technologies of blockchain, such as consensus algorithm, hash function algorithm, and smart contract, a new exploration of the acquisition path of spoken English for special purposes is carried out. With the support of blockchain technology, the integrity of the database of the English for professional use corpus is higher. Understanding and improving the curriculum of English for special purposes and analyzing the problems existing in English for special purposes have effectively improved the establishment of the English for special purposes corpus. It provides a good learning tool for students to learn spoken English for special purposes, meets students' learning needs, can effectively allocate teacher resources, and gives full play to students' subjective initiative in learning.

Related Work
e advantages of blockchain in dealing with various problems are becoming more and more obvious, and there are more and more researches on blockchain. Miraz and Ali believed that blockchain (BC), the technology behind the Bitcoin cryptocurrency system, was attractive and critical for ensuring enhanced security and privacy for various applications in many other areas, such as the Internet of ings (IoT) ecosystem. Proof of work (PoW) is a cryptographic puzzle that plays a vital role in securing BC by maintaining a digital ledger of transactions. Additionally, BC records the identity of the user using a variable public key (PK), which provides an additional layer of privacy. ey surveyed recent research articles and projects/applications to evaluate the implementation of BC enhanced security and identify associated challenges and proposed solutions for BC-enabled enhanced security systems [1]. Yeoh relied on primary data from applicable regulations and secondary data in the public domain to study blockchain and innovative distributed technologies affecting the European Union (EU) and the United States. e findings showed that the smart regulatory hands-off approach adopted by the EU and the US largely boded well for the future innovative contribution of blockchain in financial services and related industries, as well as its contribution to enhancing financial inclusion. His findings provided support for blockchain technology to advance with minimal regulatory brakes for greater valueadding and efficiency gains, expanding accessibility and thus financial inclusion. It helped to draw more attention to the technology underpinning virtual currencies [2]. O'Dair and Beaven found that blockchain technology could have transformative potential for the music industry related to recorded music and the sustainability of the music business. While predictions of widespread disintermediation may be premature, blockchain technology did appear to have the potential to change the role of third parties and make musicians' careers more sustainable. Blockchain can improve the accuracy and availability of copyright data, facilitate near-real-time royalty micropayments, and significantly increase the transparency of the value chain [3]. Ittay saw high potential value in cryptocurrency blockchain protocols or distributed ledger technology (DLT). However, blockchain's requirements and guarantees for cryptocurrencies, from transaction throughput to security primitives and privacy, did not match FinTech's requirements and guarantees. He explored how blockchain research beyond Bitcoin is bridging these gaps and some of the remaining challenges [4].
English for special purposes is mainly used to learn English in a specific field or a specific occupation. is year, the development of English for special purposes is getting faster and faster. Otto P proposed a method for identifying special purpose vocabulary in data-driven learning (DDL) vocabulary activities. He applied his system to the field of civil engineering and found it to be generally effective in recognizing 18 words prevalent in civil engineering writing. In the process, he discussed one disadvantage of the system and discussed two valuable advantages: revealing the role of words in civil engineering discourse and identifying nonengineering words that were easily ignored by lecturers [5]. Gráf reported the results of an empirical study that identified repetition as one of the markers of poor fluency in advanced English learners and contributed to research on L2 fluency. An analysis of 13 hours of interview recordings of 50 native Czech-speaking advanced English learners found 1905 repetitions, of which the majority (78%) consisted of repetitions of one word appearing at the beginning of clauses and components. Both words were repeated less frequently (19%) but appeared in the same position in the utterance. Longer repetitions were much less frequent (<2.5%). Although there was still a question as to whether this fluencyenhancing strategy should be part of second language teaching, it has been argued that the spoken language learner corpus should also include samples produced by the learner's native language [6]. Chai and Subramaniam found that Computer Media Communication (CMC) has received a great deal of attention in the field of education. ey used a mixed approach of case studies to examine the communication strategies of in-service faculty graduate students using the asynchronous WeChat mobile app to solve academic problems and explore their views on the feasibility of using the spoken asynchronous communication program to solve problems. e study found that asynchronous spoken medium triggered "resented speech" patterns that reflected spoken and written characteristics. e problem-solving process in asynchronous spoken language was also mediated using low-frequency communication strategies. e findings provided a rationale for teaching through spoken-languagebased asynchronous instructional media in relation to task types and learning objectives [7]. e research is representative of the research on blockchain technology and English for professional use, but the description of the spoken language path is less, and it is still instructive for the writing of the paper.
Using blockchain technology, this paper explores the data integrity of English corpus for professional use. e test finds that when the number of error data blocks is 10, the total number of damaged data blocks and verification accuracy data blocks is about 4% in order to achieve 99% accuracy.
erefore, the integrity of the system is higher when the damage ratio is lower. e system integrity test finds that, with the number of wrong data being larger, when the wrong data block is at 100, 50% of the data blocks of the system integrity are about 1%. With the support of blockchain technology, the integrity of the database of professional English corpus is higher.

Definition and Structure of Blockchain
e essence of blockchain is an anticounterfeiting distributed database, linked from one point to another in the network. Blockchain adopts consensus algorithm to ensure the consistency of data before and after, and usually adopts encryption algorithm to ensure the security of data. Data structures in the blockchain include content records, current block root hashes, previous block root hashes, timestamps, and other pieces of information. At the same time, an end-to-end chain structure is formed in the form of timestamps and hash values, forming a decentralized, transparent, data security, data integrity, and traceable technical system, as shown in Figure 1. Due to different usage scenarios, recorded data types can include asset issuance records, liquidation records, asset transaction records, smart contract records, and even Internet of ings records. e blockchain itself is a scientific and technological means composed of a variety of disciplines. Various disciplines are combined through cryptographic algorithms to form a decentralized distributed data storage structure. ese disciplines include computer science, cryptography, mathematics, and finance. Combined with the characteristics of time stamps, the data storage structure has contextual correlation and continuity to establish a data integrity and credible system to ensure data integrity and reliability. For users to trust the blockchain system, the rules for storing, saving, and updating data are formulated accordingly. is system is called an honest distributed storage system. Because of these characteristics of this system, more and more institutions use the blockchain system to promote business activities [8].

Classification of Blockchain
(1) Public blockchain: it has the transparency of information and is a relatively convenient blockchain. Users can access and use without registration and authorization, can freely enter and exit the nodes of the network, and can also participate in the formation process of consensus on the network at any time, that is, decide which block can be added to the blockchain network. All nodes in the public blockchain can participate in information transmission and transactions, which also leads to problems such as data privacy leakage [9]. e public blockchain ensures that transaction information cannot be tampered with through cryptography, and the consensus mechanism provides users with a trusted decentralized operation mode. Consensus mechanisms in public blockchains are typically proof of work (PoW) or proof of stake (PoS). Users choose which consensus mechanism depending on how influential their consensus is. Public blockchains are also often referred to as permissionless chains. ere are two mature and successful applications of public blockchains, Bitcoin and Ethereum. Public blockchain is generally applicable to B2C, C2C, or C2B and mass-oriented e-commerce applications such as digital currency and Internet finance. (2) Community blockchain: the control group forms an alliance, also called the alliance chain. e nodes of the blockchain are preselected so that nodes and nodes can directly maintain a good network connection. Furthermore, data on the blockchain can be public or internally confidential, which can be called "partially decentralized" because it is partially distributed in a sense. e consortium chain needs to control the consensus process and preselected nodes signed by a certain number of members to determine the validity of the new block. Unlike the public blockchain, the consortium chain has some private components, but it also maintains a good degree of decentralization [10]. For example, there is an alliance chain of several financial institutions, each of which will allow one node, and the block must be confirmed by at least 10 of them for it to be effective. e federation chain only allows consensus verification by the validation participants or allows each institution to participate or form a hybrid route, such as exposing the block API and root hash value and allowing other networks to query the blockchain data and block state information. To a certain extent, this can solve the problem of data protection in public chains. Information about the United supermarket chain may be public, or it may only be visible to union members. e alliance chain is suitable for business activities and scenarios that require a high degree of confidentiality. In order to protect the privacy of transactions, all parties in the blockchain have established trust.
(3) Private blockchain: it is aimed at a unique account or a specific institution itself. Data read access has a limited scope, and participants have the right to choose whether to open the permissions. It is also possible to hold a completely private blockchain writing right according to different usage scenarios, and it is also possible to carry out certain restrictions at the same time [11]. Private blockchains by their nature are internally public, so there is no 51% attack by partially verified nodes. A private blockchain can change some of the rules because the owner of the private blockchain can easily make changes to information and data if necessary. However, in many cases, private blockchains do not have public readability, which protects some data that cannot be disclosed. erefore, the use efficiency of the private blockchain is also greatly reduced, or the information cannot be changed or it is difficult to change. e advantage of the private chain is that the transaction is verified by only a few trusted nodes, and the block generation is faster. Because the verification is carried out by trusted Mobile Information Systems nodes, there is no risk of collusion attack among common associates. In a private chain, nodes can be well connected to each other for centralized management and content audit. In addition, another important feature of private blockchains is the low cost. Private blockchains have many advantages over public blockchains. ey are better connected, can be quickly remedied by human intervention in the event of a failure, and can better protect users' privacy while maintaining transaction efficiency. Figure 2 is a schematic flowchart of the blockchain, and the specific steps are as follows:

e Workflow of the Blockchain.
(1) A node wants to initiate a new data record, and the node needs to broadcast this data record to all nodes in the entire network through the P2P network. (2) Other nodes receive the data and store the received data record in the block. (3) e node that generates the block broadcasts its block to all nodes in the entire network. (4) Other nodes verify the broadcasted block. If the block is successfully verified by other nodes, the consensus of the entire network is reached. e block will be added to the main chain and go back to step 1 to wait for a new message to be broadcast.

English for Specific Purposes (ESP)
(1) Definition: English for specific purposes (ESP) is a diverse teaching philosophy that appears in different forms. ESP is just a branch of LSP, which emerged in the United States in the 1960s. (2) English for special purposes curriculum ere are many theories about the curriculum setting of English for special purposes. It can be said that there are as many curriculum developers as there are curriculum setting methods. One of the academic courses for English for special purposes is based on spoken language, as shown in Figure 3. e second is a skill-centered curriculum model, as shown in Figure 4, and the last is a learning-centered model. Combined with the language center and skill center curriculum models, some experts put forward a new view on the acquisition path of oral English for special purposes. As shown in Figure 5, it is a learning-centered curriculum model, which believes that students' curriculum setting for professional purposes needs to be centered on students' needs and formulate learning goals. ey are concerned about whether the way students acquire knowledge is effective, whether teachers' teaching methods can arouse students' interest, whether the content, language difficulty, and system of teaching materials meet students' learning standards, and whether the use of oral knowledge corpus has exerted subjective

Identify learners' target situations
Choose the corresponding language theory Analyze the language characteristics in the target situation Establish outline Requirements for language points in the example outline of design materials Establish an evaluation system and test whether it meets there quirements in the outline   initiative. All influencing factors should be integrated into the process of curriculum design to ensure the maximum effect of the model [12].
(3) Existing problems e content of ESP teaching materials is outdated and lacks a system, and the language difficulty is high. e teaching methods are outdated and rigid, and the training and development of listening and speaking skills are neglected. e evaluation method is mainly testing, lack of national unified and effective evaluation standards, lack of practical training inspections, and inspections of language application ability in actual situations. e positioning and management of ESP are chaotic. Many colleges and universities deviate from the regulations and make ESP an elective course, and the class hours are far from up to the standard. ESP teachers are short of experience and training opportunities, have a weak willingness to teach, and often teach some experience and general knowledge. e needs analysis is centered on teachers and lacks the analysis of students and society.

ESP Management System
Requirements. According to the analysis, the system summarizes the functions into four functional modules, namely, the user identity establishment function, the user data proxy storage function, the user data access function, and the blockchain management function.
e system also designs subfunctions, as shown in Figure 6.

User Identity Establishment Function.
e main function of this module is to establish identities for users in the system, and it is necessary to establish a unique identity address so that identities can be differentiated among users. And in order to protect the user's privacy, the user's identity address information cannot relate to the real identity [13]. Secondly, the user identity establishment function needs to realize how the user proves that his identity is real and detects whether the identity of others is real to prevent impostor users.

User Data Proxy Storage Function.
e proxy storage function of user data needs to meet the needs of users to securely store data without the need for complex operations. When storing data, the system needs to protect the patient's privacy, and the user's data will not be illegally spread or used without the user's knowledge [14].

User Data Access Function.
A huge function of this system is to provide a platform for the sharing of medical data, so it will be a great demand for medical data to be accessed by third parties such as institutions and research institutes [15]. In order to facilitate the safe and convenient access of users' data by third parties, the storage organization needs to confirm the identity of the visitor and the purpose of the visitor's access to the data before accessing and then send the data to the data visitor under the premise of meeting the user's wishes.

Blockchain Management
Function. When the system processes data operations, whether it is the data storage record of the storage party or the access record of the visitor to the data, these records are very important to the user. erefore, how to record effectively and ensure that the record will not be maliciously changed is a big requirement of this system [16]. In addition, in order to support users to query their own historical operation records of data effectively and quickly, the records need to be sorted by time. e system will use the immutability, traceability, and other characteristics of the blockchain as well as time stamps to manage the records of the entire system.

Blockchain ESP Management System
Database. e characteristics of multitenancy are used to form a blockchain network, and the characteristics of the blockchain are used to prevent user data from being illegally tampered with. is section uses elliptic bilinear mapping to design the integrity verification scheme. When the user is concerned about whether the data is completely stored in the corpus, the integrity verification scheme is used to challenge the verification of the CSP [17].
By deploying distributed virtual machine agents in the cloud, the multitenant in the cloud is used to form a blockchain network, and the algorithm process of data integrity is carried out by designing a cloud-oriented data integrity verification scheme BPDP.
How to judge whether the data in the corpus has been tampered with or destroyed, this only needs to send challenge information to the server. According to the data information returned by the system, it can be judged whether the information inside the system has been tampered with or destroyed to judge the integrity of the professional corpus. By executing the mobile agent task on the storage node, the corresponding data block is obtained and returned to the VMA node to calculate the total data block. e calculation formula is as follows: According to the stored in the VMA node, the total data block label value is calculated as follows: (2) In the process of outputting the result, VMA reads the tag value of the challenge data block from its own database to calculate R and at the same time calculates the hash value E of the corresponding challenge block number and obtains the formula: Generate evidence proof � F, E, R { }, and perform the calculation based on the generated evidence: If the formula holds, the proof file is complete. e user will receive the verification result sent by the VMA, and at the same time, according to the obtained file MHT root hash value, the two match at the same time; that is, the verification result is credible. e formula for calculating the nontampering possibility data block is follows:  Mobile Information Systems the storage node of the CSP through the VMA node. According to the IPFS cluster challenge block, the file position can be obtained, and the evidence is generated and returned to the VMA. VMA calculates whether the evidence is valid through the verification formula. If it is valid, the second step of verification is performed, and the MHT is used to calculate whether the challenge block exists and whether it is consistent with the root hash value. If it is consistent, the proof file is complete; otherwise, the file is destroyed.

Hash Function Algorithm.
e hash algorithm also is the hash function. e function of the hash algorithm is to map arbitrary length of data to shorter and fixed length of data. e mapped data is the hash value. e two characteristics of hash functions are noncollision and irreversibility. Noncollision means that it is impossible to find two identical pieces of data, such that the two pieces of data have the same hash value. Irreversibility means that it is very easy to obtain the hash result from the original data, but it is difficult to obtain the original data from the hash result [18]. Hash in cryptography is a one-way cryptosystem from plaintext to ciphertext. ere is no decryption, only encryption, and it is irreversible. e ciphertext corresponding to a little difference in the plaintext will be different.
User access to the database is also very clever for the design of user access. When the visitor needs to enter this special purpose block, the system data agent will verify the visiting user. e hash value of the user generated based on the user's id address is as follows: where address represents the user's address, m and n represent the parameters in the ellipse, and new information is generated by combining the message to be signed with the user's hash value: e new information generated is processed, and f is contained in [1, n − 1]: According to the random number, the curve points of the ellipse are calculated, which can be obtained: When the value of m 1 is an integer, the value of h can be calculated: If the calculation result is h � 0, then the generated b value needs to be recalculated. If not, the calculated value of the private key is as follows: If the value of p is 0, the value of b needs to be recalculated to generate the final message and signature.
When verifying the signature, the user data is detected, and new information is generated based on the information received by the system: e hash value is recalculated: When the data of h and p are converted to integers, their values are calculated and obtained: When the verification fails, the value of the curve point of the ellipse is recalculated: After generating the new data from the data of m 1 ′ , its value is converted to an integer, and it can be gotten:

Blockchain Consensus Protocol.
Blockchain is a decentralized mechanism for maintaining system ledger and consistency according to nodes. Blockchain is a distributed and decentralized system derived from Bitcoin, which stores the internal content of the system in a distributed manner and is not controlled by the central system. Consistent content exists on each node, which is the consensus mechanism of the blockchain [19]. At present, the consensus mechanism of blockchain mainly includes 4 types: PoW, PoS, DPoS, and distributed consistency algorithm. PoW (proof of work) is equivalent to the mining principle of Bitcoin. e miner packs a new block without the network accounting and then keeps calculating to find a random number that conforms to the rules of hash cryptography. e purpose is to find a new block that can contain such a rule of random numbers [20]. After such a random number is found, the new block of the blockchain is confirmed, and the miner thus obtains the accounting right of this round of hash calculation competition. After the miner finds such a random number and broadcasts it, the nearby nodes verify the random number. If the verification is successful, the new block will be added to the old block, which is the consensus of the whole network [21].
Today Bitcoin utilizes a proof-of-work mechanism to achieve distributed consistency. However, it will consume a lot of resources, resulting in a waste of computing resources, and there are mining pools that concentrate computing power together on a large scale, which violates the essence of decentralization. One of the biggest problems is that it takes a lot of time for PoW to reach consensus, and it can only process up to 7 transactions per second, which is not suitable for large-scale commercial applications. On the premise of trust verification, nodes can enter and exit the network freely, avoiding the cost of maintaining the centralized credit intermediary and realizing complete decentralization. If the computing power of the whole network does not exceed 50%, the data on the blockchain is safe and can be distributed uniformly.
PoS (proof of stake) is to require a node to have a certain amount of digital currency to prove that it has computing power for distributed consistency confirmation to achieve a consensus mechanism for all nodes [22]. Proof of stake has a serious disadvantage; that is, if a node owns a large amount of digital currency, it is very likely to launch an attack on the entire network. is is a system instability caused by a large gap between the rich and the poor, which is unfair and will lead to the centralization of power [23]. erefore, on the basis of proof of stake, certain restrictions need to be added to ensure the fairness of the entire network verification. PoS can greatly reduce the time it takes to reach a distributed consensus and reduce the waste of computing resources caused by the PoW consensus mechanism. Network saboteurs can launch an attack on the entire network at a low cost, and the security of the network will have to be verified. e network nodes with more coins will have more billing power, which will destroy the fairness and security of the network and make the gap between the rich and the poor bigger and bigger. e distributed consensus algorithm is a traditional blockchain algorithm, the most prominent of which is the Byzantine fault-tolerant algorithm. It is very common in systems with a small number of nodes, and a little failure of a node will not affect the Byzantine fault-tolerant algorithm. ere is also a distributed consensus algorithm to solve the non-Byzantine problem in the system to ensure the consistency of the data results in the system.
is algorithm often appears in the alliance chain to solve some problems in the consensus mechanism. Based on ensuring consistency, a second-level fast consensus mechanism is realized. However, the distributed consistency algorithm does not have a certain decentralized distributed structure and lacks the consensus mechanism of the public chain, so it is more suitable for the multicentralized business model in which many parties participate.

Smart Contract Management.
e smart contract blockchain ledger database is divided for the acquisition path of spoken English for special purposes, and the key management is strengthened. e function of the key management module is to realize key generation, group key update, key file storage, key file reading, the signing, revocation, and deletion of keys by invoking smart contract, and so on. e state data of the English for special purpose corpus is changed. e state data includes personal data information, user information, student demand information public key, and group key information. In the blockchain, the code chain is designed for the data structure in the system [24]. e personal public key information stored in the blockchain includes public key ID, public key owner ID, public key content, public key issuer ID, issuer's digital signature on the public key, public key creation time, public key revocation time, and the identification of whether the public key is revoked. Table 1 shows the key data structure.
By calling the smart contract on various parameters in the system, the operation of entering, modifying, reading, revoking, and deleting the user's public key is realized. Whether there is a corresponding chain value in the code chain will affect the change of the state data of the English corpus.

Experiment of Database Integrity of ESP Management
System under Blockchain Technology. is section tests the performance of the system according to the functional design of spoken English for special purposes system and the problems existing in the acquisition path of spoken English for special purposes. By building a blockchain network and dividing the placement and management of ESP, the system realizes the functions of system login, ESP management, key management, and user management in the ESP management system. is paper analyzes the accuracy of the integrity verification protocol of the ESP management system, assuming that there are n data blocks in the professional vocabulary corpus in the ESP management system and nontampered data can be obtained. en there are damaged data blocks, the proportion of challenge data blocks to total data in the data blocks, and the database integrity of the ESP management system which is determined according to the ratio of nontampered data blocks to damaged data blocks. Figure 8 shows the data integrity in the professional vocabulary corpus when the number of error data blocks in the system is 10 and 100. When the number of error data blocks is 10, the total number of damaged data blocks and verification accuracy data blocks should reach 99% accuracy, and then the proportion should be about 4%. erefore, the integrity of the system is higher when the damage ratio is lower. When the number of incorrect data found in the system integrity test is greater, the integrity of 50% of the data blocks of the system is around 1%. With the support of blockchain technology, the integrity of the database of professional English corpus is higher.
In order to verify the integrity of the professional vocabulary corpus established in this paper, the hash value data in the corpus is saved to the blockchain by constructing the MHT structure. Finally, the results of the hash sampling data are used to complete the secondary verification of the system integrity to ensure the security integrity of the system database. After verification, the database is completer and more systematic, which can improve the efficiency of students' systematic learning of spoken English for special purposes. e establishment of professional vocabulary corpus can also meet the learning needs of students to learn professional English, realize self-learning awareness, and become an effective tool for students to learn professional English.
To check whether the professional vocabulary corpus is complete, the time cost analysis of the corpus can also be performed, as shown in Figure 9, which is a comparison chart of the time cost of preprocessing and generating evidence.
It can be seen from Figure 9 that when the blocks are too small, the number of blocks increases sharply, and the preprocessing time is long. When the block size is large, the number of data segments increases sharply when the data block is divided into data segments, which leads to an increase in the time for generating evidence. Setting the file to 1 GB and, with proper block size, a series of integrity verification will be completed in 12 s.

ESP Management System Key Performance Test.
e key of the ESP management system is designed to be updated, and the system performance is determined by calculating the number of keys and the time used. e generated test code is as follows. e time taken to generate 5, 10, 20, 50, 100, 200, and 500 subkeys in succession was tested.
e key generation test results are shown in Table 2. When the number of subkey generation times is less than 50, the key generation time can be within 100 ms, which has a faster generation speed. e length of the group key update parameter is the maximum number of computations required to obtain the latest group key. erefore, the group key update scheme can be optimized as follows: (1) When the length of the group key update parameter is large, the group key is saved locally every 50 versions. (2) e latest group key is also stored locally and is updated every time when logging in.
e optimized group key management scheme updates the parameter length of the group key of length L and  calculates the maximum key storage overhead, and the calculation amount of each historical group key is less than 100 ms.

Consensus Algorithm Comparison Experiment of ESP
System. e number of users in the English for special purpose corpus is fed into the security scheduling algorithm and filtered, all nodes are traversed, and the result is a measurable degree of security. e next part is the coin attribute proportions of the security of the six special purpose English corpora. e security proportions range from 0 to 9 from small to large, and the token transmission efficiency from small to large ranges from 10 to 99. e comparison chart after the experiment is described as follows.
As can be seen from Table 3, PoS has the best transmission efficiency, reaching 78%, and the security coin attribute is 8. Compared with the security performance in other public chains, the transmission effect and security of PoS have achieved excellent results. e security and transmission effect of the only private chain in the test did not play a good role. It proved that, in the blockchain, the proof of stake can effectively improve the security of the system.

Discussion
rough the analysis of blockchain and English for special purposes, this paper established a corpus of English for special purposes in view of the existing problems of English for special purposes. e hash function was used to verify the rigor of the system key, and the comparison experiment of the ESP system consensus algorithm was carried out, which proved that, in the blockchain, the proof of rights could effectively improve the security of the system. e smart contract blockchain ledger database was divided for the acquisition path of spoken English for special purposes, and the key management was strengthened. In all respects, blockchain is beneficial to the learning and development of spoken English for special purposes.

Conclusions
is paper focused on the consensus algorithm, hash function algorithm, and smart contract.
rough the analysis of English for special purposes, the ESP management system and spoken English for special purpose corpus were established, and the integrity of the corpus data was analyzed.
e paper firstly talked about the concept and basic structure of the blockchain so that people had a preliminary understanding of the blockchain. e definition and course modules of English for specific purposes (ESP) were described, and then combined with the algorithm of the blockchain, a corpus of spoken English for special purposes (ESP) was constructed. e paper used the knowledge of blockchain to discuss the integrity of the corpus data and found that the integrity of the system is higher when the database damage ratio is relatively low. Although the paper proposes some blockchain algorithms that are beneficial to the acquisition path of spoken English for specific purposes, the practical operation remains to be considered.

Data Availability
Data sharing is not applicable to this paper as no new data were created or analyzed in this study.

Conflicts of Interest
e author states that this paper has no conflicts of interest.