Lower bounds and optimal protocols for three-party secure computation | IEEE Conference Publication | IEEE Xplore