Do not forget to include a summary with the high level ideas from this survey (trivial for this paper..) 1) Consider that a spam filter middlebox wants to use FHE to scan emails for a specific string (which identifies spam) - the emails are encrypted for privacy reasons. The spam filter receives an encrypted email, has the public key for FHE evaluation (but of course, not the private key for decryption), knows exactly what string to look for, and wants to drop the emails that contain that string. Can the spam filter do so using FHE? Ignore performance issues here. 2) Give: - an example of a database column where encrypting the data with deterministic encryption is a very bad idea (an attacker can easily reconstruct the data using some side knowledge), and - an example where doing so does not leak anything beyond what was publicly known.