“…To evaluate the expression in (44), it is sufficient to take minimization over encoder-decoder pairs (p U |X , p Z|U,Y =y2 ) 7 When we restrict Bob's input to y2, then Alice's input X takes values in {x1, x3}. For securely computing (q X|Y =y 2 , q Z|X,Y =y 2 ) with p ∈ (0, 1), we have k = 3 and α…”