Communication Complexity and Characterization Results in Secure Computation