How does secure MPC differ from other privacy-enhancing technologies?

How does Secure Multi-Party Computation differ from Trusted Execution Environments and Fully Homomorphic Encryption?

Many of you have asked for a side-by-side comparison between different technologies that enhance privacy.

Our CTO & co-founder Niek J. Bouman wrote a paper on:

  • The working of the different technologies
  • Strengths and limitations of each approach
  • Considerations around performance and deployment

On top of that,  he also provides a unique insight into our rationale of adopting MPC as the core technology in the Virtual Data Lake product.

This paper is a great read for anyone who is interested in diving deeper into PETs.

Download PDF

Niek Bouman

CTO at Roseman Labs

Published on: 8 February 2023
Contact us