Towards Optimality In Secure Computation