Secure Two-Party Computation: A Visual Way