How to Build a Trapdoor Function from an Encryption Scheme