A Proof of Security of Yao’s Protocol for Two-Party Computation

Posted by