Invention Publication

SECURE MULTI-PARTY COMPUTATION
Abstract:
Technologies for secure multi-party computation include computing first double-encrypted data, computing second double-encrypted data, and, in a trusted execution environment, executing a query on the first double-encrypted data and the second double encrypted data to create a query-processed double-encrypted data set. The trusted execution environment can provide the query-processed double-encrypted data set to a requester such as another computer, system, or process.
Information query
Patent Agency Ranking
0/0