sounds interesting. Similar to CloudHSM, I'm assuming this will also ensure vendors/app developers meet regulatory compliance when storing corporate data?
It basically allows some untrusted party to convert ciphertext which you can decrypt to a ciphertext which someone you granted access to can decrypt.
It's like "instead of decrypting my data and encrypting with Bob's public key I want Charlie to do this operation without showing my secrets to Charlie". Charlie is a miner in our case :-)