Review Article
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
Figure 1
TEEs provide trusted containers for holding trusted code and data. Input is passed into the TEE over a secure channel and computation performed within the TEE, protected from the rest of the untrusted system.