“…Over the last decade several solutions to the above issues have been proposed, along with dramatic efficiency improvements for secure 2PC protocols based on the cut-and-choose approach of garbled circuits [4], [18], [32], [36], [39], [40], [42], [48], [50], [51], [53], [58], [64], [66], [67], [69]. Finally we note for completeness that secure computation has also been studied in great detail for many other settings, including the more general multi-party case (MPC).…”