Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
Privacy-Preserving Computation | Quadrant | Envisioning
  1. Home
  2. Research
  3. Quadrant
  4. Privacy-Preserving Computation

Privacy-Preserving Computation

Homomorphic encryption and MPC for confidential data processing.
BACK TO QUADRANT

Related Organizations

OpenMined logo
OpenMined

US · Nonprofit

98%

A community-driven organization building privacy-preserving AI technology, including PySyft for encrypted, privacy-preserving deep learning.

Developer
Duality Technologies logo
Duality Technologies

US · Startup

95%

Provides a platform for secure data collaboration using Homomorphic Encryption.

Developer
Enveil logo
Enveil

US · Startup

Supporting Evidence

Evidence data is not available for this technology yet.

Connections

Explore this signal in your context

Get a focused view of implications, timing, and action options for your organization.
Discuss this signal
VIEW INTERACTIVE VERSION
95%

Pioneered the use of Homomorphic Encryption for 'Data in Use' security, allowing secure search over encrypted data.

Developer
Zama logo
Zama

FR · Startup

95%

Open-source cryptography company building state-of-the-art Fully Homomorphic Encryption (FHE) tools and libraries.

Developer
Inpher logo
Inpher

US · Startup

92%

Secret Computing company using Multi-Party Computation and FHE for privacy-preserving analytics.

Developer
Microsoft Research logo
Microsoft Research

US · Company

90%

The research division of Microsoft.

Developer
TripleBlind logo
TripleBlind

US · Startup

90%

Offers a privacy suite that allows algorithms to run on encrypted data without decryption, using MPC and other techniques.

Developer
Cosmian logo
Cosmian

FR · Startup

88%

European deep tech startup providing a platform for encryption-in-use based on FHE and MPC.

Developer
Intel logo
Intel

US · Company

85%

Develops silicon spin qubits using advanced 300mm wafer manufacturing processes.

Developer
Partisia Blockchain logo
Partisia Blockchain

CH · Consortium

85%

Combines blockchain with Secure Multi-Party Computation for privacy-preserving decentralized applications.

Developer
Software
Software
Federated Learning Platforms

Privacy-preserving ML training across distributed sites.

TRL
6/9
Impact
5/5
Investment
4/5
Ethics Security
Ethics Security
Post-Quantum Cryptography

Security algorithms resistant to quantum computing attacks.

TRL
7/9
Impact
5/5
Investment
4/5

Privacy-preserving computation represents a breakthrough in cryptographic techniques that addresses one of the most critical challenges in the Fourth Industrial Revolution: enabling secure collaboration on sensitive data without compromising confidentiality. At its core, this technology encompasses two primary approaches—homomorphic encryption and secure multi-party computation (MPC). Homomorphic encryption allows mathematical operations to be performed directly on encrypted data, producing encrypted results that, when decrypted, match the outcome of operations performed on the original plaintext. This means that data can remain encrypted throughout the entire computational process, never exposing the underlying information. Secure multi-party computation, meanwhile, enables multiple parties to jointly compute a function over their inputs while keeping those inputs private from one another. The system works by distributing computational tasks across participants in such a way that no single party can reconstruct another's sensitive information, yet all parties can verify the accuracy of the final result.

In industrial contexts, the inability to share sensitive data has long hindered collaboration between companies, research institutions, and even different departments within the same organisation. Manufacturing firms may possess valuable operational data that could optimise supply chains if combined with competitors' information, yet sharing such data risks exposing trade secrets or proprietary processes. Similarly, healthcare organisations struggle to collaborate on patient data analysis due to privacy regulations, while financial institutions face barriers in fraud detection when they cannot pool transaction data. Privacy-preserving computation dissolves these barriers by enabling what researchers call "computation on encrypted data" or "confidential computing." Industrial partners can now perform joint analytics, train machine learning models on combined datasets, and conduct collaborative research without any party exposing their raw data. This capability unlocks new business models around data marketplaces, federated learning systems, and cross-organisational optimisation that were previously impossible due to confidentiality concerns.

Early deployments of privacy-preserving computation are already emerging across industrial sectors, though widespread adoption remains in development stages. Financial institutions have piloted MPC systems for anti-money laundering investigations, allowing banks to detect suspicious patterns across institutions without sharing customer transaction details. In manufacturing, consortiums are exploring homomorphic encryption for predictive maintenance analytics, where equipment sensor data from multiple facilities can be analysed collectively while preserving each company's operational secrets. The technology also shows promise in supply chain optimisation, where suppliers, manufacturers, and logistics providers can coordinate inventory and production schedules based on encrypted demand forecasts. However, computational overhead remains a practical limitation—operations on encrypted data typically require significantly more processing power than conventional computation. As quantum computing advances and threatens traditional encryption methods, privacy-preserving techniques are evolving to incorporate quantum-resistant algorithms, positioning them as essential infrastructure for the future of secure industrial collaboration. The trajectory suggests that as computational efficiency improves and regulatory frameworks increasingly mandate data protection, privacy-preserving computation will transition from a specialised tool to a standard component of industrial data infrastructure.

TRL
5/9Validated
Impact
5/5
Investment
4/5
Category
Ethics Security

Newsletter

Follow us for weekly foresight in your inbox.

Browse the latest from Artificial Insights, our opinionated weekly briefing exploring the transition toward AGI.
Mar 8, 2026 · Issue 131
Mar 8, 2026 · Issue 131
Prompt it into existence
Feb 23, 2026 · Issue 130
Feb 23, 2026 · Issue 130
An Apocaloptimist
Feb 9, 2026 · Issue 129
Feb 9, 2026 · Issue 129
Agent in the Loop
View all issues