... indices.
1
Throughout this paper, we assume that encryption has been compromised by the adversary.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .