Adaptively Secure Two-Party Computation with Erasures

 

Posted by