This method is intended to preserve the core principle of decentralization while introducing essential layers of confidentiality and computational performance.