Early strategies that supported each multiplication and addition, like DGHV, experienced a limit on the volume of functions that may be carried on encrypted data.
the above mentioned framework, even so, is a superb https://iwankewc205208.blogchaat.com/30182243/confidential-computing-an-overview