Leakage Abuse Attacks on Order Revealing Encryption