Round-Optimal Secure Two-Party Computation from Trapdoor Permutations