Early strategies that supported both of those multiplication and addition, like DGHV, experienced a limit on the amount of operations which could be carried on encrypted data.
FHE and confidential computing bolster https://poppyojih512839.blognody.com/30446810/the-best-side-of-confidential-computing