Secure multi-party computation
While securing data in rest and in transit is quite common, the trickiest part is to secure data that is being processed. Traditionally, the processing party had to be able to ‘see’ data to be able to work with it.
the risk connected with this method is significantly reduced when the work of processing the data is shared between different parties
It means that there is not one central player processing all the open, vulnerable data, but several contributors. Only by breaching the data processed by each player would the data make sense to the malicious perpetrator.