It allows computation to be performed on encrypted data, without decrypting it first, making it useful for secure cloud computing.
It allows computation to be performed on encrypted data, without decrypting it first, making it useful for secure cloud computing.