What can be efficiently computed about some plaintexts from their ciphertexts can be computed, just as easily, in the absence of those ciphertexts.
Sources:
NIST IR 8459
from
Introduction to Modern Cryptography