https://eprint.iacr.org/2015/1192.pdf
This is a research report, you should read page 21-25 on Existing Schemes.
write three pages contain the following three part. Must read the paper.
What is bootstrapping in homomorphic encryption?
Security assumptions
Implementation