“…TEE provides a promising hardware-based alternative for achieving secure computation with a CPUlevel performance, and thus bridges the gap between academic research and industrial adoption of secure computation. Trusted hardware provides a powerful abstraction for building secure systems and can be applied to many potential applications, such as machine learning algorithms [81,97,98,102,106,142], cloud computing [15,33,94,122,126,141], blockchain [18,22,87,159], network traffic analysis [47], scientific computation [130], data analytics [41,75,118,164,165], and privacy-preserving COVID-19 contact tracing [73].…”