Early techniques that supported equally multiplication and addition, like DGHV, had a limit on the number of operations that could be carried on encrypted data.
FHE and confidential computing reinforce adherence to https://roxannorhv045528.azzablog.com/31233480/indicators-on-data-loss-prevention-you-should-know