A method and system for secure computational outsourcing and disguise. According
to an embodiment, a first set of actual arguments and a second set of actual arguments
for an outsourced computation are determined. A first group of disguised arguments
corresponding to the first set of actual arguments is prepared with a first computer.
A second group of disguised arguments corresponding to the second set of actual
arguments is prepared with a second computer. The first and second groups of disguised
arguments are output from the first and second computers, respectively, for performance
of the outsourced computation. A third computer performs the outsourced computation
and returns a disguised result to the first and/or second computers. The first
and/or second computers then unveil the actual result from the disguised result.