In this paper we look at the use of bootstrapping and squashing
in order to make an encryption scheme fully homomorphic. The
focus will be on what this is and how it can be used. The main
focus will be on how this is applied in the paper [11] by van Dijk,
Gentry, Halevi and Vaikuntanathan