Thanks - I am not really looking for an implementation of the above scenario that is as favorable as possible to A. Rather, I am wondering whether there could exist a technique to provably destroy such a "wrapped" key by B (not by A).
Discussion
Ah I see. Maybe you can do it with Bitcoin.
Company A sends Employee B some bitcoin C on-chain, where B controls the keys.
B can verify to others that they have control of that bitcoin as proof that A has given them authorization to sign certain data on their behalf, assuming the opposing party knows that the bitcoin was really issued by A.
When B wants to destroy their authorization, they send the bitcoin back to A.