On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions