In the realm of secure computation, we strive to achieve the impossible: to compute with data we cannot see.
The goal of computation is the emulation of our synthetic abilities, not the understanding of our analytic ones.