E Shi,
K Wu - Annual International Conference on the Theory and …, 2021 - Springer
… At a very high level, we want that the untrusted router learns no information about the routing
permutation \(\pi \) as well as the messages exchanged. Moreover, the scheme should offer …