Secure Two-Party Computation via Cut-and-Choose oblivious transfer\Efficient Two-Party Secure Computation on committed inputs.pdf Secure Two-Party Computation via Cut-and-Choose oblivious transfer