Techniques for shared private data objects in a trusted execution environment