Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage