Bucketization Techniques For Encrypted Databases: Quantifying The Impact Of Query Distributions