Rational adversary with flexible utility in secure two-party computation