"use strict";(self.webpackChunkpzp_wiki=self.webpackChunkpzp_wiki||[]).push([[9655],{3905:(e,t,r)=>{r.d(t,{Zo:()=>u,kt:()=>y});var n=r(7294);function i(e,t,r){return t in e?Object.defineProperty(e,t,{value:r,enumerable:!0,configurable:!0,writable:!0}):e[t]=r,e}function o(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter((function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable}))),r.push.apply(r,n)}return r}function a(e){for(var t=1;t=0||(i[r]=e[r]);return i}(e,t);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertySymbols(e);for(n=0;n=0||Object.prototype.propertyIsEnumerable.call(e,r)&&(i[r]=e[r])}return i}var c=n.createContext({}),s=function(e){var t=n.useContext(c),r=t;return e&&(r="function"==typeof e?e(t):a(a({},t),e)),r},u=function(e){var t=s(e.components);return n.createElement(c.Provider,{value:t},e.children)},l="mdxType",f={inlineCode:"code",wrapper:function(e){var t=e.children;return n.createElement(n.Fragment,{},t)}},d=n.forwardRef((function(e,t){var r=e.components,i=e.mdxType,o=e.originalType,c=e.parentName,u=p(e,["components","mdxType","originalType","parentName"]),l=s(r),d=i,y=l["".concat(c,".").concat(d)]||l[d]||f[d]||o;return r?n.createElement(y,a(a({ref:t},u),{},{components:r})):n.createElement(y,a({ref:t},u))}));function y(e,t){var r=arguments,i=t&&t.mdxType;if("string"==typeof e||i){var o=r.length,a=new Array(o);a[0]=d;var p={};for(var c in t)hasOwnProperty.call(t,c)&&(p[c]=t[c]);p.originalType=e,p[l]="string"==typeof e?e:i,a[1]=p;for(var s=2;s{r.r(t),r.d(t,{assets:()=>c,contentTitle:()=>a,default:()=>f,frontMatter:()=>o,metadata:()=>p,toc:()=>s});var n=r(7462),i=(r(7294),r(3905));const o={sidebar_position:10},a="Peer",p={unversionedId:"concepts/peer",id:"concepts/peer",title:"Peer",description:"A peer is a participant in a gossip network, identified by a self-certifying cryptographic keypair.",source:"@site/guide/concepts/peer.md",sourceDirName:"concepts",slug:"/concepts/peer",permalink:"/guide/concepts/peer",draft:!1,editUrl:"https://github.com/facebook/docusaurus/tree/main/packages/create-docusaurus/templates/shared/guide/concepts/peer.md",tags:[],version:"current",sidebarPosition:10,frontMatter:{sidebar_position:10},sidebar:"tutorialSidebar",previous:{title:"Overview",permalink:"/guide/concepts/overview"},next:{title:"Message",permalink:"/guide/concepts/message"}},c={},s=[{value:"Keypair for SHSe",id:"keypair-for-shse",level:2}],u={toc:s},l="wrapper";function f(e){let{components:t,...r}=e;return(0,i.kt)(l,(0,n.Z)({},u,r,{components:t,mdxType:"MDXLayout"}),(0,i.kt)("h1",{id:"peer"},"Peer"),(0,i.kt)("admonition",{title:"Definition",type:"note"},(0,i.kt)("p",{parentName:"admonition"},(0,i.kt)("strong",{parentName:"p"},"A peer is a participant in a gossip network, identified by a self-certifying cryptographic keypair."))),(0,i.kt)("h2",{id:"keypair-for-shse"},"Keypair for SHSe"),(0,i.kt)("p",null,"Asymmetric cryptographic keypair that identifies the current peer."))}f.isMDXComponent=!0}}]);