In the realm of secure computation, we strive to achieve the impossible: to compute with data we cannot see.