[0. Summary] 1. Why didn't this paper use a generic secure two-party computation library to implement the desired functionality? After all, there are a bunch of such libraries available as open-source and they can compute arbitrary functions including those in this paper. 2. You are designing a security system for some task and at some point, you need an untrusted server to add up plaintext values. You do not want the server to see the plaintext values so you encrypt them before storing them at the server. What encryption scheme would you employ that enables the server to perform the desired addition? How about XOR? One example (other than FHE) for each suffices.