Review Article

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Figure 1

TEEs provide trusted containers for holding trusted code and data. Input is passed into the TEE over a secure channel and computation performed within the TEE, protected from the rest of the untrusted system.