Introduction - If you have any usage issues, please Google them yourself
Secure Two-Party Computation via Cut-and-Choose oblivious transfer\Efficient Two-Party Secure Computation on committed inputs.pdf
Secure Two-Party Computation via Cut-and-Choose oblivious transfer