Anti-Tamper Databases: Querying Encrypted Databases