Thats quite interesting and might play nicely with my prototype of ZK and bip-85 hierarchical nostr keys
https://github.com/wujifoo/nostr-bip-85-prototype
The zk can assert ownership/relationship of another key, doesn't help if the root is compromised though. So ideally you would never use the root for anything other than generating other keys. (Which can also do the same)