The issue is really on how to assemble the encrypted payload to let the receiver know which keys to use to decrypt without breaking the privacy or increasing the anonymity set.
The issue is really on how to assemble the encrypted payload to let the receiver know which keys to use to decrypt without breaking the privacy or increasing the anonymity set.