Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer

Posted by