Hiding the Input-Size in Secure Two-Party Computation

Posted by