|Abstract: ||Described herein are various technologies related to secure generation of
tokens and secure inversion of tokens. A tokenization system executes in
a secure execution environment, and is configured to receive a string and
an encrypted tokenization function. The tokenization system decrypts the
encrypted tokenization function, and executes the tokenization function
over the string to generate a token. The token is transmitted to a
logically separate computing environment, and the tokenization system
deletes the tokenization function and the string.