Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security