A few big (anti-spam) paid relays + a private one as a backup?
Discussion
Or an individual identity request encrypted to one of your public keys. Once you authorize, the system builds a unique list of keys to be sent to the requester in such a way that if the requester leaks the list, you know which requester leaked.