The complexity of information theoretic secure computation | IEEE Conference Publication | IEEE Xplore