Hierarchical determanistic keys solves this.
Discussion
The issue is really on how to assemble the encrypted payload to let the receiver know which keys to use to decrypt without breaking the privacy or increasing the anonymity set.
Hierarchical determanistic keys solves this.
The issue is really on how to assemble the encrypted payload to let the receiver know which keys to use to decrypt without breaking the privacy or increasing the anonymity set.