Encrypted Computation

Techniques (homomorphic encryption, sealed computation, trusted-hardware enclaves) that allow a host to execute an agent’s code on sensitive data without seeing the plaintext, aimed at protecting mobile agents from malicious hosts.

In this vault

Backlinks