Comment by j2kun

2 years ago

This is basically what people do with problems like Private Information Retrieval and Private Set Intersection. They use some lightly applied FHE as a subroutine, but otherwise hand-develop a cryptographic protocol for the specific program at hand.

As it turns out, these applications are much more widely used than FHE.