so, if the decoy key proof was only sent to one relay, and that relay later went off line or lost it's database, would those parties be able to decrypt those messages?
so, if the decoy key proof was only sent to one relay, and that relay later went off line or lost it's database, would those parties be able to decrypt those messages?
I think in this case, they would have to send a new proof and while they wouldn't have that throwaway key anymore, the shared secret still works out the same.