Homomorphic encryption as discussed in the previous chapters has been a topic of great interest in untrusted systems like the cloud systems. There are various other applications of using the system as well. However, when developers started incorporating the design details into a working prototype, they encountered the computational complexity that is involved in the successful deployment of the scheme.